TenantAtlas/app/Support/Operations/QueuedExecutionLegitimacyDecision.php
ahmido 5bcb4f6ab8 feat: harden queued execution legitimacy (#179)
## Summary
- add a canonical queued execution legitimacy contract for actor-bound and system-authority operation runs
- enforce legitimacy before queued jobs transition runs to running across provider, inventory, restore, bulk, sync, and scheduled backup flows
- surface blocked execution outcomes consistently in Monitoring, notifications, audit data, and the tenantless operation viewer
- add Spec 149 artifacts and focused Pest coverage for legitimacy decisions, middleware ordering, blocked presentation, retry behavior, and cross-family adoption

## Testing
- vendor/bin/sail artisan test --compact tests/Unit/Operations/QueuedExecutionLegitimacyGateTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/QueuedExecutionMiddlewareOrderingTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Verification/ProviderExecutionReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/RunInventorySyncExecutionReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/ExecuteRestoreRunExecutionReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/SystemRunBlockedExecutionNotificationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/BulkOperationExecutionReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/QueuedExecutionRetryReauthorizationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/QueuedExecutionContractMatrixTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/OperationRunBlockedExecutionPresentationTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/QueuedExecutionAuditTrailTest.php
- vendor/bin/sail artisan test --compact tests/Feature/Operations/TenantlessOperationRunViewerTest.php
- vendor/bin/sail bin pint --dirty --format agent

## Manual validation
- validated queued provider execution blocking for tenant operability drift in the integrated browser on /admin/operations and /admin/operations/{run}
- validated 404 vs 403 route behavior for non-membership vs in-scope capability denial
- validated initiator-null blocked system-run behavior without creating a user terminal notification

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #179
2026-03-17 21:52:40 +00:00

104 lines
3.6 KiB
PHP

<?php
declare(strict_types=1);
namespace App\Support\Operations;
final readonly class QueuedExecutionLegitimacyDecision
{
/**
* @param array{identity_type:string,user_id:int|null}|null $initiator
* @param array{workspace_id:int,tenant_id:int|null,provider_connection_id:int|null} $targetScope
* @param array{workspace_scope:string,tenant_scope:string,capability:string,tenant_operability:string,execution_prerequisites:string} $checks
* @param array<string, mixed> $metadata
*/
public function __construct(
public string $operationType,
public bool $allowed,
public ExecutionAuthorityMode $authorityMode,
public ?array $initiator,
public array $targetScope,
public array $checks,
public ?ExecutionDenialClass $denialClass = null,
public ?ExecutionDenialReasonCode $reasonCode = null,
public bool $retryable = false,
public array $metadata = [],
) {}
/**
* @param array{workspace_scope:string,tenant_scope:string,capability:string,tenant_operability:string,execution_prerequisites:string} $checks
* @param array<string, mixed> $metadata
*/
public static function allow(QueuedExecutionContext $context, array $checks, array $metadata = []): self
{
return new self(
operationType: $context->operationType,
allowed: true,
authorityMode: $context->authorityMode,
initiator: $context->initiatorSnapshot(),
targetScope: $context->targetScope,
checks: $checks,
metadata: $metadata,
);
}
/**
* @param array{workspace_scope:string,tenant_scope:string,capability:string,tenant_operability:string,execution_prerequisites:string} $checks
* @param array<string, mixed> $metadata
*/
public static function deny(
QueuedExecutionContext $context,
array $checks,
ExecutionDenialReasonCode $reasonCode,
array $metadata = [],
): self {
$denialClass = $reasonCode->denialClass();
return new self(
operationType: $context->operationType,
allowed: false,
authorityMode: $context->authorityMode,
initiator: $context->initiatorSnapshot(),
targetScope: $context->targetScope,
checks: $checks,
denialClass: $denialClass,
reasonCode: $reasonCode,
retryable: $denialClass->isRetryable(),
metadata: $metadata,
);
}
/**
* @return array{workspace_scope:string,tenant_scope:string,capability:string,tenant_operability:string,execution_prerequisites:string}
*/
public static function defaultChecks(): array
{
return [
'workspace_scope' => 'not_applicable',
'tenant_scope' => 'not_applicable',
'capability' => 'not_applicable',
'tenant_operability' => 'not_applicable',
'execution_prerequisites' => 'not_applicable',
];
}
/**
* @return array<string, mixed>
*/
public function toArray(): array
{
return [
'operation_type' => $this->operationType,
'authority_mode' => $this->authorityMode->value,
'allowed' => $this->allowed,
'retryable' => $this->retryable,
'reason_code' => $this->reasonCode?->value,
'denial_class' => $this->denialClass?->value,
'initiator' => $this->initiator,
'target_scope' => $this->targetScope,
'checks' => $this->checks,
'metadata' => $this->metadata,
];
}
}