## Summary - turn the Monitoring audit log placeholder into a real workspace-scoped audit review surface - introduce a shared audit recorder, richer audit value objects, and additive audit log schema evolution - add audit outcome and actor badges, permission-aware related navigation, and durable audit retention coverage ## Included - canonical `/admin/audit-log` list and detail inspection UI - audit model helpers, taxonomy expansion, actor/target snapshots, and recorder/builder services - operation terminal audit writes and purge command retention changes - spec 134 design artifacts and focused Pest coverage for audit foundation behavior ## Validation - `vendor/bin/sail bin pint --dirty --format agent` - `vendor/bin/sail artisan test --compact tests/Unit/Audit tests/Unit/Badges/AuditBadgesTest.php tests/Feature/Filament/AuditLogPageTest.php tests/Feature/Filament/AuditLogDetailInspectionTest.php tests/Feature/Filament/AuditLogAuthorizationTest.php tests/Feature/Monitoring/AuditCoverageGovernanceTest.php tests/Feature/Monitoring/AuditCoverageOperationsTest.php tests/Feature/Console/TenantpilotPurgeNonPersistentDataTest.php` ## Notes - Livewire v4.0+ compliance is preserved within the existing Filament v5 application. - No provider registration changes were needed; panel provider registration remains in `bootstrap/providers.php`. - No new globally searchable resource was introduced. - The audit page remains read-only; no destructive actions were added. - No new asset pipeline changes were introduced; existing deploy-time `php artisan filament:assets` behavior remains unchanged. Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de> Reviewed-on: #163
73 lines
1.6 KiB
PHP
73 lines
1.6 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
|
|
namespace App\Support\Audit;
|
|
|
|
use App\Services\Intune\SecretClassificationService;
|
|
|
|
final class AuditContextSanitizer
|
|
{
|
|
private const REDACTED = '[REDACTED]';
|
|
|
|
private const MAX_ITEMS = 50;
|
|
|
|
private const MAX_STRING_LENGTH = 500;
|
|
|
|
public static function sanitize(mixed $value): mixed
|
|
{
|
|
if (is_array($value)) {
|
|
$sanitized = [];
|
|
$count = 0;
|
|
|
|
foreach ($value as $key => $item) {
|
|
$count++;
|
|
|
|
if ($count > self::MAX_ITEMS) {
|
|
$sanitized['truncated'] = true;
|
|
|
|
break;
|
|
}
|
|
|
|
if (is_string($key) && self::classifier()->protectsField('audit', $key)) {
|
|
$sanitized[$key] = self::REDACTED;
|
|
|
|
continue;
|
|
}
|
|
|
|
$sanitized[$key] = self::sanitize($item);
|
|
}
|
|
|
|
return $sanitized;
|
|
}
|
|
|
|
if (is_string($value)) {
|
|
return self::sanitizeString($value);
|
|
}
|
|
|
|
return $value;
|
|
}
|
|
|
|
private static function sanitizeString(string $value): string
|
|
{
|
|
$candidate = trim($value);
|
|
|
|
if ($candidate === '') {
|
|
return $value;
|
|
}
|
|
|
|
$sanitized = self::classifier()->sanitizeAuditString($value);
|
|
|
|
if (mb_strlen($sanitized) <= self::MAX_STRING_LENGTH) {
|
|
return $sanitized;
|
|
}
|
|
|
|
return mb_substr($sanitized, 0, self::MAX_STRING_LENGTH).' [truncated]';
|
|
}
|
|
|
|
private static function classifier(): SecretClassificationService
|
|
{
|
|
return app(SecretClassificationService::class);
|
|
}
|
|
}
|