SVT/FixControls.ps1

Set-StrictMode -Version Latest

function Set-AzSKADOSecurityStatus
{
    [OutputType([String])]
    Param
    (
        [string]
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [Alias("oz")]
        $OrganizationName,

        [string]
        [Parameter()]
        [ValidateNotNullOrEmpty()]
        [Alias("pn")]
        $ProjectName,

        [string]
        [Parameter()]
        [ValidateNotNullOrEmpty()]
        [Alias("rn")]
        $ResourceNames,

        [string]
        [Parameter()]
        [ValidateNotNullOrEmpty()]
        [Alias("ern")]
        $ExcludeResourceNames,

        [string]
        [Parameter(Mandatory = $true)]
        [Alias("cid")]
        [AllowEmptyString()]
        $ControlId,

        [System.Security.SecureString]
        [Parameter()]
        [Alias("tk")]
        $PATToken,

        [switch]
        [Parameter()]
        [Alias("pfp")]
        $PromptForPAT,

        [string]
        [Parameter()]
        [Alias("ptu")]
        $PATTokenURL,

        [string]
        [Parameter()]
        [ValidateNotNullOrEmpty()]
        [Alias("pp")]
        $PolicyProject,

        [switch]
        [Parameter()]
        [Alias("uf")]
        $UndoFix = $false,

        [switch]
        [Parameter()]
        [Alias("upc")]
        $UsePartialCommits,

        [switch]
        [Parameter()]
        [Alias("f")]
        $Force,

        [string]
        [Parameter(Mandatory = $false)]
        [Alias("exp")]
        $ExcludePrincipalId,

        [string]
        [Parameter(Mandatory = $false)]
        [Alias("am")]
        $AddUsers

    )
    Begin
    {
        [CommandHelper]::BeginCommand($PSCmdlet.MyInvocation);
        [ListenerHelper]::RegisterListeners();
    }

    Process
    {
        try
        {
            if (-not [string]::IsNullOrWhitespace($ResourceNames) -and -not [string]::IsNullOrWhitespace($ExcludeResourceNames))
            {
                throw [SuppressedException] "'ResourceNames' and 'ExcludeResourceNames' are exclusive parameters. Please use only one of them in the command"   
            }
            $projectArray = $ProjectName -Split ','
            if ($projectArray.Count -gt 1){
                throw [SuppressedException] "This command supports fix for one project at a time."
            }
            $controlArray = $ControlId -Split ','
            if ($controlArray.Count -gt 1){
                throw [SuppressedException] "This command supports fix for one control at a time."
            }
            if($PromptForPAT -eq $true)
            {
                if($null -ne $PATToken)
                {
                    throw [SuppressedException] "Parameters '-PromptForPAT' and '-PATToken' can not be used simultaneously in the scan command." 
                }
                else
                {
                    $PATToken = Read-Host "Provide PAT for [$OrganizationName] org:" -AsSecureString
                }

            }

            if (-not [String]::IsNullOrWhitespace($PATTokenURL))
            {
                #Parse the key-vault-URL to determine vaultname, secretname, version
                if ($PATTokenURL -match "^https://(?<kv>[\w]+)(?:[\.\w+]*)/secrets/(?<sn>[\w]+)/?(?<sv>[\w]*)")
                {
                    $kvName = $Matches["kv"]
                    $secretName = $Matches["sn"]
                    $secretVersion = $Matches["sv"]

                    if (-not [String]::IsNullOrWhitespace($secretVersion))
                    {
                        $kvSecret = Get-AzKeyVaultSecret -VaultName $kvName -SecretName $secretName -Version $secretVersion
                    }
                    else
                    {
                        $kvSecret = Get-AzKeyVaultSecret -VaultName $kvName -SecretName $secretName
                    }

                    if ($null -eq $kvSecret)
                    {
                        throw [SuppressedException] "Could not extract PATToken from the given key vault URL.`r`nStopping scan command." 
                    }
                    $PATToken = $kvSecret.SecretValue;
                }
                else {
                    throw [SuppressedException] "Could not extract PATToken from the given key vault URL.`r`nStopping scan command." 
                }
            }

            #Fetching resource type name based on control id
            $ResourceTypeName =$ControlId.Split("_")[1]

            $resolver = [SVTResourceResolver]::new($OrganizationName, $ProjectName, $ResourceNames, $ExcludeResourceNames, $PATToken, $ResourceTypeName, $UndoFix, $ControlId);
            $secStatus = [ServicesSecurityStatus]::new($OrganizationName,$ProjectName, $PSCmdlet.MyInvocation, $resolver, $ControlId);
            
            if ($secStatus)
            {
                return $secStatus.EvaluateControlStatus();
            }
        }
        catch
        {
            [EventBase]::PublishGenericException($_);
        }
    }

    End
    {
    [ListenerHelper]::UnregisterListeners();
    }
}