## Summary Automated scanning of Entra ID directory roles to surface high-privilege role assignments as trackable findings with alerting support. ## What's included ### Core Services - **EntraAdminRolesReportService** — Fetches role definitions + assignments via Graph API, builds payload with fingerprint deduplication - **EntraAdminRolesFindingGenerator** — Creates/resolves/reopens findings based on high-privilege role catalog - **HighPrivilegeRoleCatalog** — Curated list of high-privilege Entra roles (Global Admin, Privileged Auth Admin, etc.) - **ScanEntraAdminRolesJob** — Queued job orchestrating scan → report → findings → alerts pipeline ### UI - **AdminRolesSummaryWidget** — Tenant dashboard card showing last scan time, high-privilege assignment count, scan trigger button - RBAC-gated: `ENTRA_ROLES_VIEW` for viewing, `ENTRA_ROLES_MANAGE` for scan trigger ### Infrastructure - Graph contracts for `entraRoleDefinitions` + `entraRoleAssignments` - `config/entra_permissions.php` — Entra permission registry - `StoredReport.fingerprint` migration (deduplication support) - `OperationCatalog` label + duration for `entra.admin_roles.scan` - Artisan command `entra:scan-admin-roles` for CLI/scheduled use ### Global UX improvement - **SummaryCountsNormalizer**: Zero values filtered, snake_case keys humanized (e.g. `report_deduped: 1` → `Report deduped: 1`). Affects all operation notifications. ## Test Coverage - **12 test files**, **79+ tests**, **307+ assertions** - Report service, finding generator, job orchestration, widget rendering, alert integration, RBAC enforcement, badge mapping ## Spec artifacts - `specs/105-entra-admin-roles-evidence-findings/tasks.md` — Full task breakdown (38 tasks, all complete) - `specs/105-entra-admin-roles-evidence-findings/checklists/requirements.md` — All items checked ## Files changed 46 files changed, 3641 insertions(+), 15 deletions(-) Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de> Reviewed-on: #128
58 lines
1.9 KiB
PHP
58 lines
1.9 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
|
|
use App\Models\StoredReport;
|
|
use Illuminate\Foundation\Testing\RefreshDatabase;
|
|
|
|
uses(RefreshDatabase::class);
|
|
|
|
it('persists fingerprint and previous_fingerprint columns', function (): void {
|
|
[$user, $tenant] = createUserWithTenant();
|
|
|
|
$report = StoredReport::factory()->create([
|
|
'tenant_id' => $tenant->getKey(),
|
|
'report_type' => StoredReport::REPORT_TYPE_ENTRA_ADMIN_ROLES,
|
|
'fingerprint' => str_repeat('a', 64),
|
|
'previous_fingerprint' => str_repeat('b', 64),
|
|
]);
|
|
|
|
$fresh = StoredReport::query()->find($report->getKey());
|
|
|
|
expect($fresh->fingerprint)->toBe(str_repeat('a', 64))
|
|
->and($fresh->previous_fingerprint)->toBe(str_repeat('b', 64));
|
|
});
|
|
|
|
it('prevents duplicate (tenant_id, report_type, fingerprint) via unique index', function (): void {
|
|
[$user, $tenant] = createUserWithTenant();
|
|
$fingerprint = hash('sha256', 'test-content');
|
|
|
|
StoredReport::factory()->create([
|
|
'tenant_id' => $tenant->getKey(),
|
|
'report_type' => StoredReport::REPORT_TYPE_ENTRA_ADMIN_ROLES,
|
|
'fingerprint' => $fingerprint,
|
|
]);
|
|
|
|
expect(fn () => StoredReport::factory()->create([
|
|
'tenant_id' => $tenant->getKey(),
|
|
'report_type' => StoredReport::REPORT_TYPE_ENTRA_ADMIN_ROLES,
|
|
'fingerprint' => $fingerprint,
|
|
]))->toThrow(\Illuminate\Database\QueryException::class);
|
|
});
|
|
|
|
it('allows null fingerprint for existing reports without fingerprinting', function (): void {
|
|
[$user, $tenant] = createUserWithTenant();
|
|
|
|
$report = StoredReport::factory()->create([
|
|
'tenant_id' => $tenant->getKey(),
|
|
'report_type' => StoredReport::REPORT_TYPE_PERMISSION_POSTURE,
|
|
'fingerprint' => null,
|
|
'previous_fingerprint' => null,
|
|
]);
|
|
|
|
$fresh = StoredReport::query()->find($report->getKey());
|
|
|
|
expect($fresh->fingerprint)->toBeNull()
|
|
->and($fresh->previous_fingerprint)->toBeNull();
|
|
});
|