TenantAtlas/apps/platform/app/Services/Verification/StartVerification.php
ahmido 110245a9ec
Some checks are pending
Main Confidence / confidence (push) Waiting to run
feat: neutralize provider connection target-scope surfaces (#274)
## Summary
- add a shared provider target-scope descriptor, normalizer, identity-context metadata, and surface-summary layer
- update provider connection list, detail, create, edit, and onboarding surfaces to use neutral target-scope vocabulary while keeping Microsoft identity contextual
- align provider connection audit and resolver output with the neutral target-scope contract and add focused guard/unit/feature coverage for regressions

## Validation
- browser smoke: opened the tenant-scoped provider connection list, drilled into detail, and verified the edit/create surfaces in local admin context

## Notes
- this PR comes from the session branch created for the active feature work
- no additional runtime or persistence layer was introduced in this slice

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #274
2026-04-25 09:07:40 +00:00

159 lines
5.8 KiB
PHP

<?php
declare(strict_types=1);
namespace App\Services\Verification;
use App\Jobs\ProviderConnectionHealthCheckJob;
use App\Models\OperationRun;
use App\Models\ProviderConnection;
use App\Models\Tenant;
use App\Models\User;
use App\Services\Providers\ProviderConnectionResolver;
use App\Services\Providers\ProviderIdentityResolver;
use App\Services\Providers\ProviderOperationStartGate;
use App\Services\Providers\ProviderOperationStartResult;
use App\Support\Auth\Capabilities;
use App\Support\Operations\ExecutionAuthorityMode;
use App\Support\Providers\ProviderVerificationStatus;
use Illuminate\Support\Facades\Gate;
use InvalidArgumentException;
use Symfony\Component\HttpKernel\Exception\NotFoundHttpException;
final class StartVerification
{
public function __construct(
private readonly ProviderOperationStartGate $providers,
private readonly ProviderConnectionResolver $connections,
private readonly ProviderIdentityResolver $identityResolver,
) {}
/**
* Start (or dedupe) a provider-connection verification run.
*
* @param array<string, mixed> $extraContext
*/
public function providerConnectionCheck(
Tenant $tenant,
ProviderConnection $connection,
User $initiator,
array $extraContext = [],
): ProviderOperationStartResult {
return $this->providerConnectionCheckUsingConnection(
tenant: $tenant,
connection: $connection,
initiator: $initiator,
extraContext: $extraContext,
);
}
/**
* Start (or dedupe) a provider-connection verification run for the tenant default connection.
*
* @param array<string, mixed> $extraContext
*/
public function providerConnectionCheckForTenant(
Tenant $tenant,
User $initiator,
array $extraContext = [],
): ProviderOperationStartResult {
if (! $initiator->canAccessTenant($tenant)) {
throw new NotFoundHttpException;
}
Gate::forUser($initiator)->authorize(Capabilities::PROVIDER_RUN, $tenant);
$resolution = $this->connections->resolveDefault($tenant, 'microsoft');
if ($resolution->resolved && $resolution->connection instanceof ProviderConnection) {
return $this->providerConnectionCheckUsingConnection(
tenant: $tenant,
connection: $resolution->connection,
initiator: $initiator,
extraContext: $extraContext,
);
}
return $this->providers->start(
tenant: $tenant,
connection: null,
operationType: 'provider.connection.check',
dispatcher: fn (OperationRun $run): mixed => $this->dispatchConnectionHealthCheck($run, $tenant, $initiator),
initiator: $initiator,
extraContext: array_merge($extraContext, [
'execution_authority_mode' => ExecutionAuthorityMode::ActorBound->value,
'required_capability' => Capabilities::PROVIDER_RUN,
]),
);
}
/**
* Start (or dedupe) a provider-connection verification run for an explicit connection.
*
* @param array<string, mixed> $extraContext
*/
public function providerConnectionCheckUsingConnection(
Tenant $tenant,
ProviderConnection $connection,
User $initiator,
array $extraContext = [],
): ProviderOperationStartResult {
if (! $initiator->canAccessTenant($tenant)) {
throw new NotFoundHttpException;
}
Gate::forUser($initiator)->authorize(Capabilities::PROVIDER_RUN, $tenant);
$identity = $this->identityResolver->resolve($connection);
$result = $this->providers->start(
tenant: $tenant,
connection: $connection,
operationType: 'provider.connection.check',
dispatcher: fn (OperationRun $run): mixed => $this->dispatchConnectionHealthCheck($run, $tenant, $initiator),
initiator: $initiator,
extraContext: array_merge($extraContext, [
'execution_authority_mode' => ExecutionAuthorityMode::ActorBound->value,
'required_capability' => Capabilities::PROVIDER_RUN,
'identity' => [
'connection_type' => $identity->connectionType->value,
'credential_source' => $identity->credentialSource,
'effective_client_id' => $identity->effectiveClientId,
'target_scope' => $identity->targetScope?->toArray(),
'provider_identity_context' => array_map(
static fn ($detail): array => $detail->toArray(),
$identity->contextualIdentityDetails,
),
],
]),
);
if ($result->status === 'started') {
$connection->update([
'verification_status' => ProviderVerificationStatus::Pending,
'last_error_reason_code' => null,
'last_error_message' => null,
]);
}
return $result;
}
private function dispatchConnectionHealthCheck(OperationRun $run, Tenant $tenant, User $initiator): mixed
{
$context = is_array($run->context ?? null) ? $run->context : [];
$providerConnectionId = $context['provider_connection_id'] ?? null;
if (! is_numeric($providerConnectionId)) {
throw new InvalidArgumentException('Provider connection id is missing from run context.');
}
return ProviderConnectionHealthCheckJob::dispatch(
tenantId: (int) $tenant->getKey(),
userId: (int) $initiator->getKey(),
providerConnectionId: (int) $providerConnectionId,
operationRun: $run,
);
}
}