## Summary - replace the legacy Tenant and TenantMembership core models with ManagedEnvironment and ManagedEnvironmentMembership - propagate the managed environment naming and key changes across Filament resources, pages, controllers, jobs, models, and supporting runtime paths - add feature 279 spec artifacts and focused managed-environment test coverage for model behavior, route binding, panel context, authorization, and legacy guardrails ## Validation - `cd apps/platform && ./vendor/bin/sail artisan test --compact tests/Feature/ManagedEnvironment/LegacyTenantCoreGuardTest.php tests/Feature/ManagedEnvironment/ManagedEnvironmentAuthorizationTest.php tests/Feature/ManagedEnvironment/ManagedEnvironmentPanelContextTest.php tests/Feature/ManagedEnvironment/ManagedEnvironmentRouteBindingTest.php tests/Unit/ManagedEnvironment/ManagedEnvironmentContextResolverTest.php tests/Unit/ManagedEnvironment/ManagedEnvironmentModelTest.php` - `cd apps/platform && ./vendor/bin/sail bin pint --dirty --format agent` ## Notes - branch pushed from commit `1123b122` - browser smoke test file was added but not run in this pass Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de> Reviewed-on: #335
85 lines
2.8 KiB
PHP
85 lines
2.8 KiB
PHP
<?php
|
|
|
|
namespace App\Services\Hardening;
|
|
|
|
use App\Contracts\Hardening\WriteGateInterface;
|
|
use App\Exceptions\Hardening\ProviderAccessHardeningRequired;
|
|
use App\Models\ManagedEnvironment;
|
|
use Illuminate\Support\Facades\Log;
|
|
|
|
class IntuneRbacWriteGate implements WriteGateInterface
|
|
{
|
|
public function evaluate(ManagedEnvironment $tenant, string $operationType): void
|
|
{
|
|
if (! $this->isEnabled()) {
|
|
Log::warning('Intune write gate is disabled — write operation proceeding without RBAC verification.', [
|
|
'managed_environment_id' => $tenant->getKey(),
|
|
'operation_type' => $operationType,
|
|
]);
|
|
|
|
return;
|
|
}
|
|
|
|
$status = $tenant->rbac_status;
|
|
|
|
if ($status === null || $status === 'not_configured') {
|
|
throw new ProviderAccessHardeningRequired(
|
|
tenantId: (int) $tenant->getKey(),
|
|
operationType: $operationType,
|
|
reasonCode: 'intune_rbac.not_configured',
|
|
reasonMessage: 'Intune RBAC is not configured for this tenant. Configure RBAC before performing write operations.',
|
|
);
|
|
}
|
|
|
|
if (in_array($status, ['degraded', 'failed', 'error', 'missing', 'partial'], true)) {
|
|
throw new ProviderAccessHardeningRequired(
|
|
tenantId: (int) $tenant->getKey(),
|
|
operationType: $operationType,
|
|
reasonCode: 'intune_rbac.unhealthy',
|
|
reasonMessage: sprintf(
|
|
'Intune RBAC status is "%s". Resolve RBAC issues before performing write operations.',
|
|
$status,
|
|
),
|
|
);
|
|
}
|
|
|
|
if ($this->isStale($tenant)) {
|
|
throw new ProviderAccessHardeningRequired(
|
|
tenantId: (int) $tenant->getKey(),
|
|
operationType: $operationType,
|
|
reasonCode: 'intune_rbac.stale',
|
|
reasonMessage: 'Intune RBAC health check is outdated. Run a fresh health check before performing write operations.',
|
|
);
|
|
}
|
|
}
|
|
|
|
public function wouldBlock(ManagedEnvironment $tenant): bool
|
|
{
|
|
try {
|
|
$this->evaluate($tenant, 'ui_check');
|
|
|
|
return false;
|
|
} catch (ProviderAccessHardeningRequired) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
private function isEnabled(): bool
|
|
{
|
|
return (bool) config('tenantpilot.hardening.intune_write_gate.enabled', true);
|
|
}
|
|
|
|
private function isStale(ManagedEnvironment $tenant): bool
|
|
{
|
|
$lastCheckedAt = $tenant->rbac_last_checked_at;
|
|
|
|
if ($lastCheckedAt === null) {
|
|
return true;
|
|
}
|
|
|
|
$thresholdHours = (int) config('tenantpilot.hardening.intune_write_gate.freshness_threshold_hours', 24);
|
|
|
|
return $lastCheckedAt->diffInHours(now()) >= $thresholdHours;
|
|
}
|
|
}
|