TenantAtlas/app/Support/Audit/AuditContextSanitizer.php
ahmido ec71c2d4e7 feat: harden findings workflow and audit backstop (#181)
## Summary
- harden finding lifecycle changes behind the canonical `FindingWorkflowService` gateway
- route automated resolve and reopen flows through the same audited workflow path
- tighten tenant and workspace scope checks on finding actions and audit visibility
- add focused spec artifacts, workflow regression coverage, automation coverage, and audit visibility tests
- update legacy finding model tests to use the workflow service after direct lifecycle mutators were removed

## Testing
- `vendor/bin/sail bin pint --dirty --format agent`
- focused findings and audit slices passed during implementation
- `vendor/bin/sail artisan test --compact tests/Feature/Models/FindingResolvedTest.php`
- full repository suite passed: `2757 passed`, `8 skipped`, `14448 assertions`

## Notes
- Livewire v4.0+ compliance preserved
- no new Filament assets or panel providers introduced; provider registration remains in `bootstrap/providers.php`
- findings stay on existing Filament action surfaces, with destructive actions still confirmation-gated
- no global search behavior was changed for findings resources

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #181
2026-03-18 12:57:23 +00:00

86 lines
1.9 KiB
PHP

<?php
declare(strict_types=1);
namespace App\Support\Audit;
use App\Services\Intune\SecretClassificationService;
final class AuditContextSanitizer
{
private const REDACTED = '[REDACTED]';
/**
* @var array<int, string>
*/
private const DROPPED_FIELDS = [
'evidence_jsonb',
'raw_evidence',
'snapshot_payload',
];
private const MAX_ITEMS = 50;
private const MAX_STRING_LENGTH = 500;
public static function sanitize(mixed $value): mixed
{
if (is_array($value)) {
$sanitized = [];
$count = 0;
foreach ($value as $key => $item) {
$count++;
if ($count > self::MAX_ITEMS) {
$sanitized['truncated'] = true;
break;
}
if (is_string($key) && in_array($key, self::DROPPED_FIELDS, true)) {
continue;
}
if (is_string($key) && self::classifier()->protectsField('audit', $key)) {
$sanitized[$key] = self::REDACTED;
continue;
}
$sanitized[$key] = self::sanitize($item);
}
return $sanitized;
}
if (is_string($value)) {
return self::sanitizeString($value);
}
return $value;
}
private static function sanitizeString(string $value): string
{
$candidate = trim($value);
if ($candidate === '') {
return $value;
}
$sanitized = self::classifier()->sanitizeAuditString($value);
if (mb_strlen($sanitized) <= self::MAX_STRING_LENGTH) {
return $sanitized;
}
return mb_substr($sanitized, 0, self::MAX_STRING_LENGTH).' [truncated]';
}
private static function classifier(): SecretClassificationService
{
return app(SecretClassificationService::class);
}
}