## Summary - introduce a shared tenant-owned query and record-resolution canon for first-slice Filament resources - harden direct views, row actions, bulk actions, relation managers, and workspace-admin canonical viewers against wrong-tenant access - add registry-backed rollout metadata, search posture handling, architectural guards, and focused Pest coverage for scope parity and 404/403 semantics ## Included - Spec 150 package under `specs/150-tenant-owned-query-canon-and-wrong-tenant-guards/` - shared support classes: `TenantOwnedModelFamilies`, `TenantOwnedQueryScope`, `TenantOwnedRecordResolver` - shared Filament concern: `InteractsWithTenantOwnedRecords` - resource/page/policy hardening across findings, policies, policy versions, backup schedules, backup sets, restore runs, inventory items, and Entra groups - additional regression coverage for canonical tenant state, wrong-tenant record resolution, relation-manager congruence, and action-surface guardrails ## Validation - `vendor/bin/sail artisan test --compact` passed - full suite result: `2733 passed, 8 skipped` - formatting applied with `vendor/bin/sail bin pint --dirty --format agent` ## Notes - Livewire v4.0+ compliant via existing Filament v5 stack - provider registration remains in `bootstrap/providers.php` - globally searchable first-slice posture: Entra groups scoped; policies and policy versions explicitly disabled - destructive actions continue to use confirmation and policy authorization - no new Filament assets added; existing deployment flow remains unchanged, including `php artisan filament:assets` when registered assets are used Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de> Reviewed-on: #180
140 lines
4.0 KiB
PHP
140 lines
4.0 KiB
PHP
<?php
|
|
|
|
namespace App\Policies;
|
|
|
|
use App\Models\Finding;
|
|
use App\Models\Tenant;
|
|
use App\Models\User;
|
|
use App\Services\Auth\CapabilityResolver;
|
|
use App\Support\Auth\Capabilities;
|
|
use App\Support\OperateHub\OperateHubShell;
|
|
use Filament\Facades\Filament;
|
|
use Illuminate\Auth\Access\HandlesAuthorization;
|
|
use Illuminate\Auth\Access\Response;
|
|
|
|
class FindingPolicy
|
|
{
|
|
use HandlesAuthorization;
|
|
|
|
public function viewAny(User $user): bool
|
|
{
|
|
$tenant = $this->resolvedTenant();
|
|
|
|
if (! $tenant instanceof Tenant) {
|
|
return false;
|
|
}
|
|
|
|
if (! $user->canAccessTenant($tenant)) {
|
|
return false;
|
|
}
|
|
|
|
return app(CapabilityResolver::class)->can($user, $tenant, Capabilities::TENANT_FINDINGS_VIEW);
|
|
}
|
|
|
|
public function view(User $user, Finding $finding): Response|bool
|
|
{
|
|
$tenant = $this->resolvedTenant();
|
|
|
|
if (! $tenant) {
|
|
return Response::denyAsNotFound();
|
|
}
|
|
|
|
if (! $user->canAccessTenant($tenant)) {
|
|
return Response::denyAsNotFound();
|
|
}
|
|
|
|
if ((int) $finding->tenant_id !== (int) $tenant->getKey()) {
|
|
return Response::denyAsNotFound();
|
|
}
|
|
|
|
return app(CapabilityResolver::class)->can($user, $tenant, Capabilities::TENANT_FINDINGS_VIEW);
|
|
}
|
|
|
|
public function update(User $user, Finding $finding): Response|bool
|
|
{
|
|
return $this->triage($user, $finding);
|
|
}
|
|
|
|
public function triage(User $user, Finding $finding): Response|bool
|
|
{
|
|
return $this->canMutateWithAnyCapability($user, $finding, [
|
|
Capabilities::TENANT_FINDINGS_TRIAGE,
|
|
Capabilities::TENANT_FINDINGS_ACKNOWLEDGE,
|
|
]);
|
|
}
|
|
|
|
public function assign(User $user, Finding $finding): Response|bool
|
|
{
|
|
return $this->canMutateWithCapability($user, $finding, Capabilities::TENANT_FINDINGS_ASSIGN);
|
|
}
|
|
|
|
public function resolve(User $user, Finding $finding): Response|bool
|
|
{
|
|
return $this->canMutateWithCapability($user, $finding, Capabilities::TENANT_FINDINGS_RESOLVE);
|
|
}
|
|
|
|
public function close(User $user, Finding $finding): Response|bool
|
|
{
|
|
return $this->canMutateWithCapability($user, $finding, Capabilities::TENANT_FINDINGS_CLOSE);
|
|
}
|
|
|
|
public function riskAccept(User $user, Finding $finding): Response|bool
|
|
{
|
|
return $this->canMutateWithCapability($user, $finding, Capabilities::TENANT_FINDINGS_RISK_ACCEPT);
|
|
}
|
|
|
|
public function reopen(User $user, Finding $finding): Response|bool
|
|
{
|
|
return $this->triage($user, $finding);
|
|
}
|
|
|
|
private function canMutateWithCapability(User $user, Finding $finding, string $capability): Response|bool
|
|
{
|
|
return $this->canMutateWithAnyCapability($user, $finding, [$capability]);
|
|
}
|
|
|
|
/**
|
|
* @param array<int, string> $capabilities
|
|
*/
|
|
private function canMutateWithAnyCapability(User $user, Finding $finding, array $capabilities): Response|bool
|
|
{
|
|
$tenant = $this->resolvedTenant();
|
|
|
|
if (! $tenant instanceof Tenant) {
|
|
return Response::denyAsNotFound();
|
|
}
|
|
|
|
if (! $user->canAccessTenant($tenant)) {
|
|
return Response::denyAsNotFound();
|
|
}
|
|
|
|
if ((int) $finding->tenant_id !== (int) $tenant->getKey()) {
|
|
return Response::denyAsNotFound();
|
|
}
|
|
|
|
/** @var CapabilityResolver $resolver */
|
|
$resolver = app(CapabilityResolver::class);
|
|
|
|
foreach ($capabilities as $capability) {
|
|
if ($resolver->can($user, $tenant, $capability)) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return Response::deny();
|
|
}
|
|
|
|
private function resolvedTenant(): ?Tenant
|
|
{
|
|
if (Filament::getCurrentPanel()?->getId() === 'admin') {
|
|
$tenant = app(OperateHubShell::class)->tenantOwnedPanelContext(request());
|
|
|
|
return $tenant instanceof Tenant ? $tenant : null;
|
|
}
|
|
|
|
$tenant = Tenant::current();
|
|
|
|
return $tenant instanceof Tenant ? $tenant : null;
|
|
}
|
|
}
|