TenantAtlas/database/factories/FindingFactory.php
ahmido ec71c2d4e7 feat: harden findings workflow and audit backstop (#181)
## Summary
- harden finding lifecycle changes behind the canonical `FindingWorkflowService` gateway
- route automated resolve and reopen flows through the same audited workflow path
- tighten tenant and workspace scope checks on finding actions and audit visibility
- add focused spec artifacts, workflow regression coverage, automation coverage, and audit visibility tests
- update legacy finding model tests to use the workflow service after direct lifecycle mutators were removed

## Testing
- `vendor/bin/sail bin pint --dirty --format agent`
- focused findings and audit slices passed during implementation
- `vendor/bin/sail artisan test --compact tests/Feature/Models/FindingResolvedTest.php`
- full repository suite passed: `2757 passed`, `8 skipped`, `14448 assertions`

## Notes
- Livewire v4.0+ compliance preserved
- no new Filament assets or panel providers introduced; provider registration remains in `bootstrap/providers.php`
- findings stay on existing Filament action surfaces, with destructive actions still confirmation-gated
- no global search behavior was changed for findings resources

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #181
2026-03-18 12:57:23 +00:00

191 lines
5.8 KiB
PHP

<?php
namespace Database\Factories;
use App\Models\Finding;
use App\Models\Tenant;
use Illuminate\Database\Eloquent\Factories\Factory;
/**
* @extends \Illuminate\Database\Eloquent\Factories\Factory<\App\Models\Finding>
*/
class FindingFactory extends Factory
{
/**
* Define the model's default state.
*
* @return array<string, mixed>
*/
public function definition(): array
{
$seenAt = now();
return [
'tenant_id' => Tenant::factory(),
'finding_type' => Finding::FINDING_TYPE_DRIFT,
'scope_key' => hash('sha256', fake()->uuid()),
'baseline_operation_run_id' => null,
'current_operation_run_id' => null,
'fingerprint' => hash('sha256', fake()->uuid()),
'subject_type' => 'assignment',
'subject_external_id' => fake()->uuid(),
'severity' => Finding::SEVERITY_MEDIUM,
'status' => Finding::STATUS_NEW,
'acknowledged_at' => null,
'acknowledged_by_user_id' => null,
'first_seen_at' => $seenAt,
'last_seen_at' => $seenAt,
'times_seen' => 1,
'sla_days' => 14,
'due_at' => $seenAt->copy()->addDays(14),
'owner_user_id' => null,
'assignee_user_id' => null,
'triaged_at' => null,
'in_progress_at' => null,
'reopened_at' => null,
'closed_at' => null,
'closed_by_user_id' => null,
'closed_reason' => null,
'recurrence_key' => null,
'evidence_jsonb' => [],
];
}
/**
* State for permission posture findings.
*/
public function permissionPosture(): static
{
return $this->state(fn (array $attributes): array => [
'finding_type' => Finding::FINDING_TYPE_PERMISSION_POSTURE,
'source' => 'permission_check',
'subject_type' => 'permission',
'subject_external_id' => 'DeviceManagementConfiguration.ReadWrite.All',
'severity' => Finding::SEVERITY_MEDIUM,
'evidence_jsonb' => [
'permission_key' => 'DeviceManagementConfiguration.ReadWrite.All',
'permission_type' => 'application',
'expected_status' => 'granted',
'actual_status' => 'missing',
'blocked_features' => ['policy-sync', 'backup'],
'checked_at' => now()->toIso8601String(),
],
]);
}
/**
* State for legacy acknowledged findings.
*/
public function acknowledged(): static
{
return $this->state(fn (array $attributes): array => [
'status' => Finding::STATUS_ACKNOWLEDGED,
'acknowledged_at' => now(),
'acknowledged_by_user_id' => null,
]);
}
/**
* State for triaged findings.
*/
public function triaged(): static
{
return $this->state(fn (array $attributes): array => [
'status' => Finding::STATUS_TRIAGED,
'triaged_at' => now(),
]);
}
/**
* State for in-progress findings.
*/
public function inProgress(): static
{
return $this->state(function (array $attributes): array {
$triagedAt = now()->subMinute();
return [
'status' => Finding::STATUS_IN_PROGRESS,
'triaged_at' => $attributes['triaged_at'] ?? $triagedAt,
'in_progress_at' => now(),
];
});
}
/**
* State for resolved findings.
*/
public function resolved(): static
{
return $this->state(fn (array $attributes): array => [
'status' => Finding::STATUS_RESOLVED,
'resolved_at' => now(),
'resolved_reason' => 'permission_granted',
]);
}
/**
* State for reopened findings.
*/
public function reopened(): static
{
return $this->state(fn (array $attributes): array => [
'status' => Finding::STATUS_REOPENED,
'reopened_at' => now(),
'resolved_at' => null,
'resolved_reason' => null,
'closed_at' => null,
'closed_reason' => null,
'closed_by_user_id' => null,
]);
}
/**
* State for closed findings.
*/
public function closed(): static
{
return $this->state(fn (array $attributes): array => [
'status' => Finding::STATUS_CLOSED,
'closed_at' => now(),
'closed_reason' => 'duplicate',
]);
}
/**
* State for risk accepted findings.
*/
public function riskAccepted(): static
{
return $this->state(fn (array $attributes): array => [
'status' => Finding::STATUS_RISK_ACCEPTED,
'closed_at' => now(),
'closed_reason' => 'accepted_risk',
]);
}
/**
* State for Entra admin roles findings.
*/
public function entraAdminRoles(): static
{
return $this->state(fn (array $attributes): array => [
'finding_type' => Finding::FINDING_TYPE_ENTRA_ADMIN_ROLES,
'source' => 'entra.admin_roles',
'severity' => Finding::SEVERITY_CRITICAL,
'subject_type' => 'role_assignment',
'evidence_jsonb' => [
'role_display_name' => 'Global Administrator',
'principal_display_name' => 'Admin User',
'principal_type' => 'user',
'principal_id' => fake()->uuid(),
'role_definition_id' => fake()->uuid(),
'role_template_id' => '62e90394-69f5-4237-9190-012177145e10',
'directory_scope_id' => '/',
'is_built_in' => true,
'measured_at' => now()->toIso8601String(),
],
]);
}
}