## Summary
- add a canonical queued execution legitimacy contract for actor-bound and system-authority operation runs
- enforce legitimacy before queued jobs transition runs to running across provider, inventory, restore, bulk, sync, and scheduled backup flows
- surface blocked execution outcomes consistently in Monitoring, notifications, audit data, and the tenantless operation viewer
- add Spec 149 artifacts and focused Pest coverage for legitimacy decisions, middleware ordering, blocked presentation, retry behavior, and cross-family adoption
## Testing
- vendor/bin/sail artisan test --compact tests/Unit/Operations/QueuedExecutionLegitimacyGateTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/QueuedExecutionMiddlewareOrderingTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Verification/ProviderExecutionReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/RunInventorySyncExecutionReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/ExecuteRestoreRunExecutionReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/SystemRunBlockedExecutionNotificationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/BulkOperationExecutionReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/QueuedExecutionRetryReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/QueuedExecutionContractMatrixTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/OperationRunBlockedExecutionPresentationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/QueuedExecutionAuditTrailTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/TenantlessOperationRunViewerTest.php
- vendor/bin/sail bin pint --dirty --format agent
## Manual validation
- validated queued provider execution blocking for tenant operability drift in the integrated browser on /admin/operations and /admin/operations/{run}
- validated 404 vs 403 route behavior for non-membership vs in-scope capability denial
- validated initiator-null blocked system-run behavior without creating a user terminal notification
Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #179
104 lines
3.6 KiB
PHP
104 lines
3.6 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
|
|
namespace App\Support\Operations;
|
|
|
|
final readonly class QueuedExecutionLegitimacyDecision
|
|
{
|
|
/**
|
|
* @param array{identity_type:string,user_id:int|null}|null $initiator
|
|
* @param array{workspace_id:int,tenant_id:int|null,provider_connection_id:int|null} $targetScope
|
|
* @param array{workspace_scope:string,tenant_scope:string,capability:string,tenant_operability:string,execution_prerequisites:string} $checks
|
|
* @param array<string, mixed> $metadata
|
|
*/
|
|
public function __construct(
|
|
public string $operationType,
|
|
public bool $allowed,
|
|
public ExecutionAuthorityMode $authorityMode,
|
|
public ?array $initiator,
|
|
public array $targetScope,
|
|
public array $checks,
|
|
public ?ExecutionDenialClass $denialClass = null,
|
|
public ?ExecutionDenialReasonCode $reasonCode = null,
|
|
public bool $retryable = false,
|
|
public array $metadata = [],
|
|
) {}
|
|
|
|
/**
|
|
* @param array{workspace_scope:string,tenant_scope:string,capability:string,tenant_operability:string,execution_prerequisites:string} $checks
|
|
* @param array<string, mixed> $metadata
|
|
*/
|
|
public static function allow(QueuedExecutionContext $context, array $checks, array $metadata = []): self
|
|
{
|
|
return new self(
|
|
operationType: $context->operationType,
|
|
allowed: true,
|
|
authorityMode: $context->authorityMode,
|
|
initiator: $context->initiatorSnapshot(),
|
|
targetScope: $context->targetScope,
|
|
checks: $checks,
|
|
metadata: $metadata,
|
|
);
|
|
}
|
|
|
|
/**
|
|
* @param array{workspace_scope:string,tenant_scope:string,capability:string,tenant_operability:string,execution_prerequisites:string} $checks
|
|
* @param array<string, mixed> $metadata
|
|
*/
|
|
public static function deny(
|
|
QueuedExecutionContext $context,
|
|
array $checks,
|
|
ExecutionDenialReasonCode $reasonCode,
|
|
array $metadata = [],
|
|
): self {
|
|
$denialClass = $reasonCode->denialClass();
|
|
|
|
return new self(
|
|
operationType: $context->operationType,
|
|
allowed: false,
|
|
authorityMode: $context->authorityMode,
|
|
initiator: $context->initiatorSnapshot(),
|
|
targetScope: $context->targetScope,
|
|
checks: $checks,
|
|
denialClass: $denialClass,
|
|
reasonCode: $reasonCode,
|
|
retryable: $denialClass->isRetryable(),
|
|
metadata: $metadata,
|
|
);
|
|
}
|
|
|
|
/**
|
|
* @return array{workspace_scope:string,tenant_scope:string,capability:string,tenant_operability:string,execution_prerequisites:string}
|
|
*/
|
|
public static function defaultChecks(): array
|
|
{
|
|
return [
|
|
'workspace_scope' => 'not_applicable',
|
|
'tenant_scope' => 'not_applicable',
|
|
'capability' => 'not_applicable',
|
|
'tenant_operability' => 'not_applicable',
|
|
'execution_prerequisites' => 'not_applicable',
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @return array<string, mixed>
|
|
*/
|
|
public function toArray(): array
|
|
{
|
|
return [
|
|
'operation_type' => $this->operationType,
|
|
'authority_mode' => $this->authorityMode->value,
|
|
'allowed' => $this->allowed,
|
|
'retryable' => $this->retryable,
|
|
'reason_code' => $this->reasonCode?->value,
|
|
'denial_class' => $this->denialClass?->value,
|
|
'initiator' => $this->initiator,
|
|
'target_scope' => $this->targetScope,
|
|
'checks' => $this->checks,
|
|
'metadata' => $this->metadata,
|
|
];
|
|
}
|
|
}
|