TenantAtlas/app/Services/Intune/IntuneRoleDefinitionNormalizer.php
ahmido c6e7591d19 feat: add Intune RBAC inventory and backup support (#155)
## Summary
- add Intune RBAC role definitions and role assignments as foundation-backed inventory, backup, and versioned snapshot types
- add RBAC-specific normalization, coverage, permission-warning handling, and preview-only restore safety behavior across existing Filament and service surfaces
- add spec 127 artifacts, contracts, audits, and focused regression coverage for inventory, backup, versioning, verification, and authorization behavior

## Testing
- `vendor/bin/sail bin pint --dirty --format agent`
- `vendor/bin/sail artisan test --compact tests/Feature/Inventory/InventorySyncServiceTest.php tests/Feature/Filament/InventoryCoverageTableTest.php tests/Feature/FoundationBackupTest.php tests/Feature/Filament/RestoreExecutionTest.php tests/Feature/RestoreUnknownPolicyTypeSafetyTest.php tests/Unit/GraphContractRegistryTest.php tests/Unit/FoundationSnapshotServiceTest.php tests/Feature/Verification/IntuneRbacPermissionCoverageTest.php tests/Unit/IntuneRoleDefinitionNormalizerTest.php tests/Unit/IntuneRoleAssignmentNormalizerTest.php`

## Notes
- tasks in `specs/127-rbac-inventory-backup/tasks.md` are complete except `T041`, which is the documented manual QA validation step

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #155
2026-03-09 10:40:51 +00:00

207 lines
6.4 KiB
PHP

<?php
namespace App\Services\Intune;
use Illuminate\Support\Arr;
class IntuneRoleDefinitionNormalizer implements PolicyTypeNormalizer
{
public function __construct(
private readonly DefaultPolicyNormalizer $defaultNormalizer,
) {}
public function supports(string $policyType): bool
{
return $policyType === 'intuneRoleDefinition';
}
/**
* @return array{status: string, settings: array<int, array<string, mixed>>, warnings: array<int, string>}
*/
public function normalize(?array $snapshot, string $policyType, ?string $platform = null): array
{
$snapshot = is_array($snapshot) ? $snapshot : [];
if ($snapshot === []) {
return [
'status' => 'warning',
'settings' => [],
'warnings' => ['No snapshot available.'],
];
}
$settings = [];
$warnings = [];
$summaryEntries = [];
$this->pushEntry($summaryEntries, 'Display name', Arr::get($snapshot, 'displayName'));
$this->pushEntry($summaryEntries, 'Description', Arr::get($snapshot, 'description'));
$isBuiltIn = Arr::get($snapshot, 'isBuiltIn');
if (is_bool($isBuiltIn)) {
$this->pushEntry($summaryEntries, 'Role source', $isBuiltIn ? 'Built-in' : 'Custom');
}
$permissionBlocks = $this->normalizePermissionBlocks(Arr::get($snapshot, 'rolePermissions', []));
$this->pushEntry($summaryEntries, 'Permission blocks', count($permissionBlocks));
$scopeTagIds = $this->normalizedStringList(Arr::get($snapshot, 'roleScopeTagIds', []));
$this->pushEntry($summaryEntries, 'Scope tag IDs', $scopeTagIds);
if ($summaryEntries !== []) {
$settings[] = [
'type' => 'keyValue',
'title' => 'Role definition',
'entries' => $summaryEntries,
];
}
foreach ($permissionBlocks as $index => $block) {
$entries = [];
$this->pushEntry($entries, 'Allowed actions', $block['allowed']);
$this->pushEntry($entries, 'Denied actions', $block['denied']);
$this->pushEntry($entries, 'Conditions', $block['conditions']);
if ($entries === []) {
continue;
}
$settings[] = [
'type' => 'keyValue',
'title' => sprintf('Permission block %d', $index + 1),
'entries' => $entries,
];
}
if ($permissionBlocks === []) {
$warnings[] = 'Role definition contains no expanded permission blocks.';
}
if ($settings === []) {
return [
'status' => 'warning',
'settings' => [],
'warnings' => array_values(array_unique(array_merge($warnings, ['Role definition snapshot contains no readable fields.']))),
];
}
return [
'status' => $warnings === [] ? 'ok' : 'warning',
'settings' => $settings,
'warnings' => array_values(array_unique($warnings)),
];
}
/**
* @return array<string, mixed>
*/
public function flattenForDiff(?array $snapshot, string $policyType, ?string $platform = null): array
{
return $this->defaultNormalizer->flattenNormalizedForDiff(
$this->normalize($snapshot, $policyType, $platform),
);
}
/**
* @return array<int, array{allowed: array<int, string>, denied: array<int, string>, conditions: array<int, string>, fingerprint: string}>
*/
private function normalizePermissionBlocks(mixed $rolePermissions): array
{
if (! is_array($rolePermissions)) {
return [];
}
$normalized = [];
foreach ($rolePermissions as $permissionBlock) {
if (! is_array($permissionBlock)) {
continue;
}
$resourceActions = $permissionBlock['resourceActions'] ?? null;
$resourceActions = is_array($resourceActions) ? $resourceActions : [];
$allowed = [];
$denied = [];
$conditions = [];
foreach ($resourceActions as $resourceAction) {
if (! is_array($resourceAction)) {
continue;
}
$allowed = array_merge($allowed, $this->normalizedStringList($resourceAction['allowedResourceActions'] ?? []));
$denied = array_merge($denied, $this->normalizedStringList($resourceAction['notAllowedResourceActions'] ?? []));
$conditions = array_merge($conditions, $this->normalizedStringList([$resourceAction['condition'] ?? null]));
}
$allowed = array_values(array_unique($allowed));
sort($allowed);
$denied = array_values(array_unique($denied));
sort($denied);
$conditions = array_values(array_unique($conditions));
sort($conditions);
$block = [
'allowed' => $allowed,
'denied' => $denied,
'conditions' => $conditions,
];
$block['fingerprint'] = hash(
'sha256',
json_encode($block, JSON_THROW_ON_ERROR | JSON_UNESCAPED_SLASHES | JSON_UNESCAPED_UNICODE),
);
$normalized[] = $block;
}
usort($normalized, fn (array $left, array $right): int => strcmp($left['fingerprint'], $right['fingerprint']));
return $normalized;
}
/**
* @param array<int, array{key: string, value: mixed}> $entries
*/
private function pushEntry(array &$entries, string $key, mixed $value): void
{
if ($value === null) {
return;
}
if (is_string($value) && $value === '') {
return;
}
if (is_array($value) && $value === []) {
return;
}
$entries[] = [
'key' => $key,
'value' => $value,
];
}
/**
* @return array<int, string>
*/
private function normalizedStringList(mixed $values): array
{
if (! is_array($values)) {
return [];
}
return array_values(array_filter(
array_map(
static fn (mixed $value): ?string => is_string($value) && $value !== '' ? $value : null,
$values,
),
static fn (?string $value): bool => $value !== null,
));
}
}