TenantAtlas/app/Support/Audit/AuditContextSanitizer.php
ahmido 28cfe38ba4 feat: lay audit log foundation (#163)
## Summary
- turn the Monitoring audit log placeholder into a real workspace-scoped audit review surface
- introduce a shared audit recorder, richer audit value objects, and additive audit log schema evolution
- add audit outcome and actor badges, permission-aware related navigation, and durable audit retention coverage

## Included
- canonical `/admin/audit-log` list and detail inspection UI
- audit model helpers, taxonomy expansion, actor/target snapshots, and recorder/builder services
- operation terminal audit writes and purge command retention changes
- spec 134 design artifacts and focused Pest coverage for audit foundation behavior

## Validation
- `vendor/bin/sail bin pint --dirty --format agent`
- `vendor/bin/sail artisan test --compact tests/Unit/Audit tests/Unit/Badges/AuditBadgesTest.php tests/Feature/Filament/AuditLogPageTest.php tests/Feature/Filament/AuditLogDetailInspectionTest.php tests/Feature/Filament/AuditLogAuthorizationTest.php tests/Feature/Monitoring/AuditCoverageGovernanceTest.php tests/Feature/Monitoring/AuditCoverageOperationsTest.php tests/Feature/Console/TenantpilotPurgeNonPersistentDataTest.php`

## Notes
- Livewire v4.0+ compliance is preserved within the existing Filament v5 application.
- No provider registration changes were needed; panel provider registration remains in `bootstrap/providers.php`.
- No new globally searchable resource was introduced.
- The audit page remains read-only; no destructive actions were added.
- No new asset pipeline changes were introduced; existing deploy-time `php artisan filament:assets` behavior remains unchanged.

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #163
2026-03-11 09:39:37 +00:00

73 lines
1.6 KiB
PHP

<?php
declare(strict_types=1);
namespace App\Support\Audit;
use App\Services\Intune\SecretClassificationService;
final class AuditContextSanitizer
{
private const REDACTED = '[REDACTED]';
private const MAX_ITEMS = 50;
private const MAX_STRING_LENGTH = 500;
public static function sanitize(mixed $value): mixed
{
if (is_array($value)) {
$sanitized = [];
$count = 0;
foreach ($value as $key => $item) {
$count++;
if ($count > self::MAX_ITEMS) {
$sanitized['truncated'] = true;
break;
}
if (is_string($key) && self::classifier()->protectsField('audit', $key)) {
$sanitized[$key] = self::REDACTED;
continue;
}
$sanitized[$key] = self::sanitize($item);
}
return $sanitized;
}
if (is_string($value)) {
return self::sanitizeString($value);
}
return $value;
}
private static function sanitizeString(string $value): string
{
$candidate = trim($value);
if ($candidate === '') {
return $value;
}
$sanitized = self::classifier()->sanitizeAuditString($value);
if (mb_strlen($sanitized) <= self::MAX_STRING_LENGTH) {
return $sanitized;
}
return mb_substr($sanitized, 0, self::MAX_STRING_LENGTH).' [truncated]';
}
private static function classifier(): SecretClassificationService
{
return app(SecretClassificationService::class);
}
}