TenantAtlas/apps/platform/app/Services/Auth/CapabilityResolver.php
ahmido c7b38606a9 feat: implement spec 285 workspace-first environment access (#344)
Implements platform feature branch `285-workspace-rbac-environment-access`.

Summary:
- switch managed environment authorization to workspace-first role resolution with explicit environment-scope narrowing
- rewire Filament pages, resources, policies, and user tenant access helpers to the shared access-scope resolver
- add Spec 285 coverage across unit, feature, and browser tests plus full spec artifacts

Validation:
- `cd apps/platform && ./vendor/bin/sail artisan test --compact tests/Unit/Auth/WorkspaceFirstCapabilityResolverTest.php tests/Unit/Auth/ManagedEnvironmentAccessScopeResolverTest.php`
- `cd apps/platform && ./vendor/bin/sail artisan test --compact tests/Feature/Auth/WorkspaceFirstManagedEnvironmentAccessTest.php tests/Feature/Filament/ManagedEnvironmentAccessScopeManagementTest.php tests/Feature/Filament/WorkspaceMembershipRoleManagementTest.php tests/Feature/Rbac/GovernanceArtifactsWorkspaceFirstAuthorizationTest.php tests/Feature/Rbac/OperationRunWorkspaceFirstAuthorizationTest.php tests/Feature/Rbac/ProviderConnectionWorkspaceFirstPolicyTest.php`
- `cd apps/platform && ./vendor/bin/sail artisan test --compact tests/Feature/Verification/ProviderExecutionReauthorizationTest.php tests/Feature/ProviderConnections/ProviderConnectionHealthCheckStartSurfaceTest.php tests/Feature/Tenants/TenantProviderBackedActionStartTest.php`
- `cd apps/platform && ./vendor/bin/sail artisan test --compact tests/Feature/Audit/TenantMembershipAuditLogTest.php tests/Feature/Filament/TenantMembersTest.php tests/Feature/TenantRBAC/TenantMembershipCrudTest.php tests/Feature/TenantRBAC/TenantSwitcherScopeTest.php`
- `cd apps/platform && ./vendor/bin/sail artisan test --compact tests/Browser/Spec285WorkspaceRbacEnvironmentAccessSmokeTest.php`
- `cd apps/platform && ./vendor/bin/sail bin pint --dirty --format agent`

Target branch: `platform-dev`.

Follow-up integration path after merge:
- `platform-dev` -> `dev`.

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #344
2026-05-09 12:40:50 +00:00

151 lines
4.7 KiB
PHP

<?php
namespace App\Services\Auth;
use App\Models\ManagedEnvironment;
use App\Models\User;
use App\Support\Auth\Capabilities;
use App\Support\Auth\WorkspaceRole;
use Illuminate\Support\Facades\Log;
/**
* Capability Resolver
*
* Resolves user memberships and capabilities for a given tenant.
* Caches results per request to avoid N+1 queries.
*/
class CapabilityResolver
{
private array $loggedDenials = [];
public function __construct(
private readonly ManagedEnvironmentAccessScopeResolver $accessScopeResolver,
) {}
/**
* Get the user's role for a tenant
*/
public function getRole(User $user, ManagedEnvironment $tenant): ?WorkspaceRole
{
$decision = $this->accessScopeResolver->decision($user, $tenant);
if (! $decision->workspaceMember || $decision->workspaceRole === null) {
return null;
}
return WorkspaceRole::tryFrom($decision->workspaceRole);
}
/**
* Check if user can perform a capability on a tenant
*/
public function can(User $user, ManagedEnvironment $tenant, string $capability): bool
{
if (! Capabilities::isKnown($capability)) {
throw new \InvalidArgumentException("Unknown capability: {$capability}");
}
$decision = $this->accessScopeResolver->decision($user, $tenant, $capability);
if (! $decision->workspaceMember || ! $decision->managedEnvironmentAllowed) {
$this->logDenial($user, $tenant, $capability, $decision->failedBoundary);
return false;
}
if ($this->isLocallyDeniedByBackupHealthBrowserFixture($user, $tenant, $capability)) {
$this->logDenial($user, $tenant, $capability, 'capability');
return false;
}
if (! $decision->capabilityAllowed) {
$this->logDenial($user, $tenant, $capability, $decision->failedBoundary);
}
return $decision->capabilityAllowed;
}
private function isLocallyDeniedByBackupHealthBrowserFixture(User $user, ManagedEnvironment $tenant, string $capability): bool
{
if (! app()->environment(['local', 'testing'])) {
return false;
}
$fixture = config('tenantpilot.backup_health.browser_smoke_fixture.blocked_drillthrough');
if (! is_array($fixture)) {
return false;
}
$fixtureUserEmail = config('tenantpilot.backup_health.browser_smoke_fixture.user.email');
if (! is_string($fixtureUserEmail) || $fixtureUserEmail === '' || $user->email !== $fixtureUserEmail) {
return false;
}
$fixtureTenantExternalId = $fixture['tenant_external_id'] ?? null;
if (! is_string($fixtureTenantExternalId) || $fixtureTenantExternalId === '' || $tenant->external_id !== $fixtureTenantExternalId) {
return false;
}
$deniedCapabilities = $fixture['capability_denials'] ?? [];
if (! is_array($deniedCapabilities)) {
return false;
}
return in_array($capability, $deniedCapabilities, true);
}
private function logDenial(User $user, ManagedEnvironment $tenant, string $capability, ?string $failedBoundary = null): void
{
$key = implode(':', [(string) $user->getKey(), (string) $tenant->getKey(), $capability]);
if (isset($this->loggedDenials[$key])) {
return;
}
$this->loggedDenials[$key] = true;
Log::warning('rbac.denied', [
'capability' => $capability,
'failed_boundary' => $failedBoundary,
'workspace_id' => is_numeric($tenant->workspace_id) ? (int) $tenant->workspace_id : null,
'managed_environment_id' => (int) $tenant->getKey(),
'actor_user_id' => (int) $user->getKey(),
]);
}
/**
* Check if user has any membership for a tenant
*/
public function isMember(User $user, ManagedEnvironment $tenant): bool
{
return $this->accessScopeResolver->canAccess($user, $tenant);
}
/**
* Prime workspace membership and managed-environment scope cache for a set of tenants.
*
* Used to avoid N+1 queries for bulk selection authorization while still
* reflecting membership changes that may have happened earlier in the same
* request or test process.
*
* @param array<int, int|string> $tenantIds
*/
public function primeMemberships(User $user, array $tenantIds): void
{
$this->accessScopeResolver->prime($user, $tenantIds);
}
/**
* Clear cached memberships (useful for testing or after membership changes)
*/
public function clearCache(): void
{
$this->accessScopeResolver->clearCache();
}
}