PR Body Implements Spec 065 “Tenant RBAC v1” with capabilities-first RBAC, tenant membership scoping (Option 3), and consistent Filament action semantics. Key decisions / rules Tenancy Option 3: tenant switching is tenantless (ChooseTenant), tenant-scoped routes stay scoped, non-members get 404 (not 403). RBAC model: canonical capability registry + role→capability map + Gates for each capability (no role-string checks in UI logic). UX policy: for tenant members lacking permission → actions are visible but disabled + tooltip (avoid click→403). Security still enforced server-side. What’s included Capabilities foundation: Central capability registry (Capabilities::*) Role→capability mapping (RoleCapabilityMap) Gate registration + resolver/manager updates to support tenant-scoped authorization Filament enforcement hardening across the app: Tenant registration & tenant CRUD properly gated Backup/restore/policy flows aligned to “visible-but-disabled” where applicable Provider operations (health check / inventory sync / compliance snapshot) guarded and normalized Directory groups + inventory sync start surfaces normalized Policy version maintenance actions (archive/restore/prune/force delete) gated SpecKit artifacts for 065: spec.md, plan/tasks updates, checklists, enforcement hitlist Security guarantees Non-member → 404 via tenant scoping/membership guards. Member without capability → 403 on execution, even if UI is disabled. No destructive actions execute without proper authorization checks. Tests Adds/updates Pest coverage for: Tenant scoping & membership denial behavior Role matrix expectations (owner/manager/operator/readonly) Filament surface checks (visible/disabled actions, no side effects) Provider/Inventory/Groups run-start authorization Verified locally with targeted vendor/bin/sail artisan test --compact … Deployment / ops notes No new services required. Safe change: behavior is authorization + UI semantics; no breaking route changes intended. Co-authored-by: Ahmed Darrazi <ahmeddarrazi@MacBookPro.fritz.box> Reviewed-on: #79
152 lines
4.0 KiB
PHP
152 lines
4.0 KiB
PHP
<?php
|
|
|
|
namespace App\Filament\Resources\RestoreRunResource\Pages;
|
|
|
|
use App\Filament\Resources\RestoreRunResource;
|
|
use App\Models\BackupSet;
|
|
use App\Models\Tenant;
|
|
use App\Support\Auth\Capabilities;
|
|
use Filament\Actions\Action;
|
|
use Filament\Resources\Pages\Concerns\HasWizard;
|
|
use Filament\Resources\Pages\CreateRecord;
|
|
use Illuminate\Database\Eloquent\Model;
|
|
use Illuminate\Support\Facades\Gate;
|
|
use Livewire\Attributes\On;
|
|
|
|
class CreateRestoreRun extends CreateRecord
|
|
{
|
|
use HasWizard;
|
|
|
|
protected static string $resource = RestoreRunResource::class;
|
|
|
|
protected function authorizeAccess(): void
|
|
{
|
|
$tenant = Tenant::current();
|
|
|
|
abort_unless($tenant instanceof Tenant && Gate::allows(Capabilities::TENANT_MANAGE, $tenant), 403);
|
|
}
|
|
|
|
public function getSteps(): array
|
|
{
|
|
return RestoreRunResource::getWizardSteps();
|
|
}
|
|
|
|
protected function afterFill(): void
|
|
{
|
|
$backupSetIdRaw = request()->query('backup_set_id');
|
|
|
|
if (! is_numeric($backupSetIdRaw)) {
|
|
return;
|
|
}
|
|
|
|
$backupSetId = (int) $backupSetIdRaw;
|
|
|
|
if ($backupSetId <= 0) {
|
|
return;
|
|
}
|
|
|
|
$tenant = Tenant::current();
|
|
|
|
if (! $tenant) {
|
|
return;
|
|
}
|
|
|
|
$belongsToTenant = BackupSet::query()
|
|
->where('tenant_id', $tenant->id)
|
|
->whereKey($backupSetId)
|
|
->exists();
|
|
|
|
if (! $belongsToTenant) {
|
|
return;
|
|
}
|
|
|
|
$backupItemIds = $this->normalizeBackupItemIds(request()->query('backup_item_ids'));
|
|
$scopeModeRaw = request()->query('scope_mode');
|
|
$scopeMode = in_array($scopeModeRaw, ['all', 'selected'], true)
|
|
? $scopeModeRaw
|
|
: ($backupItemIds !== [] ? 'selected' : 'all');
|
|
|
|
$this->data['backup_set_id'] = $backupSetId;
|
|
$this->form->callAfterStateUpdated('data.backup_set_id');
|
|
|
|
$this->data['scope_mode'] = $scopeMode;
|
|
$this->form->callAfterStateUpdated('data.scope_mode');
|
|
|
|
if ($scopeMode === 'selected') {
|
|
if ($backupItemIds !== []) {
|
|
$this->data['backup_item_ids'] = $backupItemIds;
|
|
}
|
|
|
|
$this->form->callAfterStateUpdated('data.backup_item_ids');
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @return array<int>
|
|
*/
|
|
private function normalizeBackupItemIds(mixed $raw): array
|
|
{
|
|
if (is_string($raw)) {
|
|
$raw = array_filter(array_map('trim', explode(',', $raw)));
|
|
}
|
|
|
|
if (! is_array($raw)) {
|
|
return [];
|
|
}
|
|
|
|
$itemIds = [];
|
|
|
|
foreach ($raw as $value) {
|
|
if (is_int($value) && $value > 0) {
|
|
$itemIds[] = $value;
|
|
|
|
continue;
|
|
}
|
|
|
|
if (is_string($value) && ctype_digit($value)) {
|
|
$itemId = (int) $value;
|
|
|
|
if ($itemId > 0) {
|
|
$itemIds[] = $itemId;
|
|
}
|
|
}
|
|
}
|
|
|
|
$itemIds = array_values(array_unique($itemIds));
|
|
sort($itemIds);
|
|
|
|
return $itemIds;
|
|
}
|
|
|
|
protected function getSubmitFormAction(): Action
|
|
{
|
|
return parent::getSubmitFormAction()
|
|
->label('Create restore run')
|
|
->icon('heroicon-o-check-circle');
|
|
}
|
|
|
|
protected function handleRecordCreation(array $data): Model
|
|
{
|
|
return RestoreRunResource::createRestoreRun($data);
|
|
}
|
|
|
|
#[On('entra-group-cache-picked')]
|
|
public function applyEntraGroupCachePick(string $sourceGroupId, string $entraId): void
|
|
{
|
|
data_set($this->data, "group_mapping.{$sourceGroupId}", $entraId);
|
|
|
|
$this->data['check_summary'] = null;
|
|
$this->data['check_results'] = [];
|
|
$this->data['checks_ran_at'] = null;
|
|
$this->data['preview_summary'] = null;
|
|
$this->data['preview_diffs'] = [];
|
|
$this->data['preview_ran_at'] = null;
|
|
|
|
$this->form->fill($this->data);
|
|
|
|
if (method_exists($this, 'unmountAction')) {
|
|
$this->unmountAction();
|
|
}
|
|
}
|
|
}
|