## Summary - turn the Monitoring audit log placeholder into a real workspace-scoped audit review surface - introduce a shared audit recorder, richer audit value objects, and additive audit log schema evolution - add audit outcome and actor badges, permission-aware related navigation, and durable audit retention coverage ## Included - canonical `/admin/audit-log` list and detail inspection UI - audit model helpers, taxonomy expansion, actor/target snapshots, and recorder/builder services - operation terminal audit writes and purge command retention changes - spec 134 design artifacts and focused Pest coverage for audit foundation behavior ## Validation - `vendor/bin/sail bin pint --dirty --format agent` - `vendor/bin/sail artisan test --compact tests/Unit/Audit tests/Unit/Badges/AuditBadgesTest.php tests/Feature/Filament/AuditLogPageTest.php tests/Feature/Filament/AuditLogDetailInspectionTest.php tests/Feature/Filament/AuditLogAuthorizationTest.php tests/Feature/Monitoring/AuditCoverageGovernanceTest.php tests/Feature/Monitoring/AuditCoverageOperationsTest.php tests/Feature/Console/TenantpilotPurgeNonPersistentDataTest.php` ## Notes - Livewire v4.0+ compliance is preserved within the existing Filament v5 application. - No provider registration changes were needed; panel provider registration remains in `bootstrap/providers.php`. - No new globally searchable resource was introduced. - The audit page remains read-only; no destructive actions were added. - No new asset pipeline changes were introduced; existing deploy-time `php artisan filament:assets` behavior remains unchanged. Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de> Reviewed-on: #163
83 lines
2.6 KiB
PHP
83 lines
2.6 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
|
|
use App\Models\AuditLog;
|
|
use App\Services\OperationRunService;
|
|
use App\Support\Audit\AuditOutcome;
|
|
use App\Support\OperationRunOutcome;
|
|
use App\Support\OperationRunStatus;
|
|
|
|
it('writes a terminal audit row when an operation run completes', function (): void {
|
|
[$user, $tenant] = createUserWithTenant(role: 'owner');
|
|
|
|
$service = app(OperationRunService::class);
|
|
|
|
$run = $service->ensureRunWithIdentity(
|
|
tenant: $tenant,
|
|
type: 'inventory_sync',
|
|
identityInputs: ['selection_hash' => 'abc123'],
|
|
context: ['selection_hash' => 'abc123'],
|
|
initiator: $user,
|
|
);
|
|
|
|
$service->updateRun(
|
|
$run,
|
|
status: OperationRunStatus::Completed->value,
|
|
outcome: OperationRunOutcome::Succeeded->value,
|
|
summaryCounts: [
|
|
'total' => 3,
|
|
'processed' => 3,
|
|
'succeeded' => 3,
|
|
'failed' => 0,
|
|
],
|
|
);
|
|
|
|
$audit = AuditLog::query()
|
|
->where('operation_run_id', (int) $run->getKey())
|
|
->latest('id')
|
|
->first();
|
|
|
|
expect($audit)->not->toBeNull();
|
|
|
|
expect($audit?->action)->toBe('operation.completed')
|
|
->and($audit?->summaryText())->toBe('Inventory sync completed')
|
|
->and($audit?->resource_type)->toBe('operation_run')
|
|
->and((string) $audit?->resource_id)->toBe((string) $run->getKey())
|
|
->and($audit?->normalizedOutcome())->toBe(AuditOutcome::Success)
|
|
->and($audit?->actorDisplayLabel())->toBe($user->name)
|
|
->and(data_get($audit?->metadata, 'operation_type'))->toBe('inventory_sync');
|
|
});
|
|
|
|
it('writes blocked terminal audit semantics for blocked runs', function (): void {
|
|
[$user, $tenant] = createUserWithTenant(role: 'owner');
|
|
|
|
$service = app(OperationRunService::class);
|
|
|
|
$run = $service->ensureRunWithIdentity(
|
|
tenant: $tenant,
|
|
type: 'restore.execute',
|
|
identityInputs: ['restore_run_id' => 44],
|
|
context: ['restore_run_id' => 44],
|
|
initiator: $user,
|
|
);
|
|
|
|
$service->finalizeBlockedRun(
|
|
$run,
|
|
reasonCode: 'intune_rbac.not_configured',
|
|
message: 'Restore is blocked until RBAC is configured.',
|
|
);
|
|
|
|
$audit = AuditLog::query()
|
|
->where('operation_run_id', (int) $run->getKey())
|
|
->latest('id')
|
|
->first();
|
|
|
|
expect($audit)->not->toBeNull();
|
|
|
|
expect($audit?->action)->toBe('operation.blocked')
|
|
->and($audit?->summaryText())->toBe('Restore execution blocked')
|
|
->and($audit?->normalizedOutcome())->toBe(AuditOutcome::Blocked)
|
|
->and(data_get($audit?->metadata, 'failure_summary.0.reason_code'))->toBe('intune_rbac.not_configured');
|
|
});
|