domain-watchdog/src/Controller/WatchListController.php

482 lines
20 KiB
PHP
Raw Normal View History

2024-07-18 13:40:49 +02:00
<?php
namespace App\Controller;
use App\Entity\Connector;
use App\Entity\Domain;
2024-08-01 14:37:23 +02:00
use App\Entity\DomainEntity;
use App\Entity\DomainEvent;
2024-07-18 13:40:49 +02:00
use App\Entity\User;
use App\Entity\WatchList;
2024-08-16 23:23:51 +02:00
use App\Notifier\TestChatNotification;
use App\Repository\DomainRepository;
2024-08-01 14:37:23 +02:00
use App\Repository\WatchListRepository;
use App\Service\ChatNotificationService;
2024-09-18 13:37:07 +02:00
use App\Service\Connector\AbstractProvider;
use App\Service\RDAPService;
2024-07-18 13:40:49 +02:00
use Doctrine\Common\Collections\Collection;
use Doctrine\DBAL\LockMode;
2024-07-18 13:40:49 +02:00
use Doctrine\ORM\EntityManagerInterface;
2024-08-15 03:04:31 +02:00
use Doctrine\ORM\Exception\ORMException;
use Doctrine\ORM\OptimisticLockException;
2024-08-01 14:37:23 +02:00
use Eluceo\iCal\Domain\Entity\Attendee;
use Eluceo\iCal\Domain\Entity\Calendar;
use Eluceo\iCal\Domain\Entity\Event;
use Eluceo\iCal\Domain\Enum\EventStatus;
2024-08-01 14:37:23 +02:00
use Eluceo\iCal\Domain\ValueObject\Category;
use Eluceo\iCal\Domain\ValueObject\Date;
use Eluceo\iCal\Domain\ValueObject\EmailAddress;
use Eluceo\iCal\Domain\ValueObject\SingleDay;
use Eluceo\iCal\Domain\ValueObject\Timestamp;
2024-08-03 18:05:05 +02:00
use Eluceo\iCal\Presentation\Component\Property;
use Eluceo\iCal\Presentation\Component\Property\Value\TextValue;
2024-08-01 14:37:23 +02:00
use Eluceo\iCal\Presentation\Factory\CalendarFactory;
2024-08-04 14:45:27 +02:00
use Psr\Log\LoggerInterface;
2024-08-01 14:37:23 +02:00
use Sabre\VObject\EofException;
use Sabre\VObject\InvalidDataException;
use Sabre\VObject\ParseException;
use Sabre\VObject\Reader;
2024-07-18 13:40:49 +02:00
use Symfony\Bundle\FrameworkBundle\Controller\AbstractController;
2024-09-25 14:02:40 +02:00
use Symfony\Component\DependencyInjection\Attribute\Autowire;
use Symfony\Component\DependencyInjection\ContainerInterface;
2024-07-18 13:40:49 +02:00
use Symfony\Component\HttpFoundation\Request;
2024-08-01 14:37:23 +02:00
use Symfony\Component\HttpFoundation\Response;
use Symfony\Component\HttpKernel\Exception\AccessDeniedHttpException;
2024-08-16 23:23:51 +02:00
use Symfony\Component\HttpKernel\Exception\BadRequestHttpException;
use Symfony\Component\HttpKernel\Exception\TooManyRequestsHttpException;
use Symfony\Component\HttpKernel\KernelInterface;
use Symfony\Component\RateLimiter\RateLimiterFactory;
2024-07-18 13:40:49 +02:00
use Symfony\Component\Routing\Attribute\Route;
use Symfony\Component\Serializer\Encoder\DecoderInterface;
2025-02-27 09:01:05 +01:00
use Symfony\Component\Serializer\Exception\ExceptionInterface;
use Symfony\Component\Serializer\Normalizer\DenormalizerInterface;
2024-07-18 13:40:49 +02:00
use Symfony\Component\Serializer\SerializerInterface;
use Symfony\Contracts\HttpClient\Exception\ClientExceptionInterface;
use Symfony\Contracts\HttpClient\Exception\DecodingExceptionInterface;
use Symfony\Contracts\HttpClient\Exception\RedirectionExceptionInterface;
use Symfony\Contracts\HttpClient\Exception\ServerExceptionInterface;
use Symfony\Contracts\HttpClient\Exception\TransportExceptionInterface;
2024-07-18 13:40:49 +02:00
class WatchListController extends AbstractController
{
public function __construct(
private readonly SerializerInterface&DecoderInterface&DenormalizerInterface $serializer,
2024-08-01 14:37:23 +02:00
private readonly EntityManagerInterface $em,
2024-08-04 14:45:27 +02:00
private readonly WatchListRepository $watchListRepository,
2024-08-23 21:19:34 +02:00
private readonly LoggerInterface $logger,
2024-09-25 14:02:40 +02:00
private readonly ChatNotificationService $chatNotificationService,
private readonly DomainRepository $domainRepository,
private readonly RDAPService $RDAPService,
private readonly RateLimiterFactory $rdapRequestsLimiter,
private readonly KernelInterface $kernel,
2024-09-25 14:02:40 +02:00
#[Autowire(service: 'service_container')]
private readonly ContainerInterface $locator,
2024-08-02 23:24:52 +02:00
) {
2024-07-18 13:40:49 +02:00
}
2024-07-29 16:01:32 +02:00
/**
* @throws TransportExceptionInterface
* @throws ServerExceptionInterface
* @throws RedirectionExceptionInterface
* @throws ExceptionInterface
* @throws DecodingExceptionInterface
* @throws ClientExceptionInterface
* @throws \JsonException
* @throws \Exception
2024-07-29 16:01:32 +02:00
*/
2024-07-18 13:40:49 +02:00
#[Route(
path: '/api/watchlists',
name: 'watchlist_create',
defaults: [
'_api_resource_class' => WatchList::class,
'_api_operation_name' => 'create',
],
methods: ['POST']
)]
public function createWatchList(Request $request): WatchList
{
$watchList = $this->registerDomainsInWatchlist($request->getContent(), ['watchlist:create']);
2024-08-03 00:06:38 +02:00
/** @var User $user */
$user = $this->getUser();
$watchList->setUser($user);
2024-07-29 16:01:32 +02:00
/*
* In the limited version, we do not want a user to be able to register the same domain more than once in their watchlists.
* This policy guarantees the equal probability of obtaining a domain name if it is requested by several users.
*/
if ($this->getParameter('limited_features')) {
2024-08-15 04:06:35 +02:00
if ($watchList->getDomains()->count() > (int) $this->getParameter('limit_max_watchlist_domains')) {
$this->logger->notice('User {username} tried to create a Watchlist. The maximum number of domains has been reached.', [
2024-08-07 14:31:44 +02:00
'username' => $user->getUserIdentifier(),
]);
throw new AccessDeniedHttpException('You have exceeded the maximum number of domain names allowed in this Watchlist');
}
$userWatchLists = $user->getWatchLists();
if ($userWatchLists->count() >= (int) $this->getParameter('limit_max_watchlist')) {
2024-08-16 14:19:59 +02:00
$this->logger->notice('User {username} tried to create a Watchlist. The maximum number of Watchlists has been reached', [
2024-08-07 14:31:44 +02:00
'username' => $user->getUserIdentifier(),
]);
throw new AccessDeniedHttpException('You have exceeded the maximum number of Watchlists allowed');
}
/** @var Domain[] $trackedDomains */
2024-08-07 14:31:44 +02:00
$trackedDomains = $userWatchLists->reduce(fn (array $acc, WatchList $watchList) => [...$acc, ...$watchList->getDomains()->toArray()], []);
/** @var Domain $domain */
foreach ($watchList->getDomains()->getIterator() as $domain) {
if (in_array($domain, $trackedDomains)) {
2024-08-16 14:19:59 +02:00
$ldhName = $domain->getLdhName();
$this->logger->notice('User {username} tried to create a watchlist with domain name {ldhName}. It is forbidden to register the same domain name twice with limited mode', [
'username' => $user->getUserIdentifier(),
2024-08-16 14:19:59 +02:00
'ldhName' => $ldhName,
]);
2024-08-16 14:19:59 +02:00
throw new AccessDeniedHttpException("It is forbidden to register the same domain name twice in your watchlists with limited mode ($ldhName)");
}
}
if (null !== $watchList->getWebhookDsn() && count($watchList->getWebhookDsn()) > (int) $this->getParameter('limit_max_watchlist_webhooks')) {
$this->logger->notice('User {username} tried to create a Watchlist. The maximum number of webhooks has been reached.', [
'username' => $user->getUserIdentifier(),
]);
throw new AccessDeniedHttpException('You have exceeded the maximum number of webhooks allowed in this Watchlist');
}
}
$this->chatNotificationService->sendChatNotification($watchList, new TestChatNotification());
$this->verifyConnector($watchList, $watchList->getConnector());
2024-08-15 03:42:41 +02:00
$this->logger->info('User {username} registers a Watchlist ({token}).', [
2024-08-04 14:45:27 +02:00
'username' => $user->getUserIdentifier(),
'token' => $watchList->getToken(),
2024-08-04 14:45:27 +02:00
]);
2024-07-18 13:40:49 +02:00
$this->em->persist($watchList);
$this->em->flush();
return $watchList;
}
#[Route(
path: '/api/watchlists',
2024-08-15 03:04:31 +02:00
name: 'watchlist_get_all_mine',
defaults: [
'_api_resource_class' => WatchList::class,
2024-08-15 03:04:31 +02:00
'_api_operation_name' => 'get_all_mine',
],
2024-08-15 03:04:31 +02:00
methods: ['GET']
)]
2024-08-15 03:04:31 +02:00
public function getWatchLists(): Collection
{
2024-08-15 03:04:31 +02:00
/** @var User $user */
$user = $this->getUser();
2024-08-15 03:04:31 +02:00
return $user->getWatchLists();
}
/**
* @throws \Exception
2025-02-27 09:01:05 +01:00
* @throws ExceptionInterface
*/
private function verifyConnector(WatchList $watchList, ?Connector $connector): void
{
/** @var User $user */
$user = $this->getUser();
if (null === $connector) {
return;
}
if (!$user->getConnectors()->contains($connector)) {
$this->logger->notice('The Connector ({connector}) does not belong to the user.', [
'username' => $user->getUserIdentifier(),
'connector' => $connector->getId(),
]);
throw new AccessDeniedHttpException('You cannot create a Watchlist with a connector that does not belong to you');
}
/** @var Domain $domain */
foreach ($watchList->getDomains()->getIterator() as $domain) {
if ($domain->getDeleted()) {
$ldhName = $domain->getLdhName();
throw new BadRequestHttpException("To add a connector, no domain in this Watchlist must have already expired ($ldhName)");
}
}
$connectorProviderClass = $connector->getProvider()->getConnectorProvider();
/** @var AbstractProvider $connectorProvider */
2024-09-25 14:02:40 +02:00
$connectorProvider = $this->locator->get($connectorProviderClass);
2024-09-25 14:02:40 +02:00
$connectorProvider->authenticate($connector->getAuthData());
$supported = $connectorProvider->isSupported(...$watchList->getDomains()->toArray());
if (!$supported) {
$this->logger->notice('The Connector ({connector}) does not support all TLDs in this Watchlist', [
'username' => $user->getUserIdentifier(),
'connector' => $connector->getId(),
]);
throw new BadRequestHttpException('This connector does not support all TLDs in this Watchlist');
}
}
2024-08-15 03:04:31 +02:00
/**
* @throws ORMException
* @throws RedirectionExceptionInterface
* @throws DecodingExceptionInterface
* @throws ClientExceptionInterface
* @throws \JsonException
* @throws OptimisticLockException
* @throws TransportExceptionInterface
* @throws ServerExceptionInterface
* @throws ExceptionInterface
2024-08-15 03:42:41 +02:00
* @throws \Exception
2024-08-15 03:04:31 +02:00
*/
#[Route(
path: '/api/watchlists/{token}',
name: 'watchlist_update',
defaults: [
'_api_resource_class' => WatchList::class,
'_api_operation_name' => 'update',
],
2024-08-15 03:04:31 +02:00
methods: ['PUT']
)]
public function putWatchList(Request $request): WatchList
{
$watchList = $this->registerDomainsInWatchlist($request->getContent(), ['watchlist:create', 'watchlist:token']);
2024-08-15 03:04:31 +02:00
/** @var User $user */
$user = $this->getUser();
2024-08-15 03:42:41 +02:00
$watchList->setUser($user);
if ($this->getParameter('limited_features')) {
2024-08-15 04:06:35 +02:00
if ($watchList->getDomains()->count() > (int) $this->getParameter('limit_max_watchlist_domains')) {
2024-08-16 14:19:59 +02:00
$this->logger->notice('User {username} tried to update a Watchlist. The maximum number of domains has been reached for this Watchlist', [
2024-08-15 03:42:41 +02:00
'username' => $user->getUserIdentifier(),
]);
throw new AccessDeniedHttpException('You have exceeded the maximum number of domain names allowed in this Watchlist');
}
$userWatchLists = $user->getWatchLists();
/** @var Domain[] $trackedDomains */
2024-08-15 03:50:29 +02:00
$trackedDomains = $userWatchLists
2024-08-15 04:06:35 +02:00
->filter(fn (WatchList $wl) => $wl->getToken() !== $watchList->getToken())
2024-08-15 03:50:29 +02:00
->reduce(fn (array $acc, WatchList $wl) => [...$acc, ...$wl->getDomains()->toArray()], []);
2024-08-15 03:42:41 +02:00
/** @var Domain $domain */
foreach ($watchList->getDomains()->getIterator() as $domain) {
if (in_array($domain, $trackedDomains)) {
2024-08-16 14:19:59 +02:00
$ldhName = $domain->getLdhName();
$this->logger->notice('User {username} tried to update a watchlist with domain name {ldhName}. It is forbidden to register the same domain name twice with limited mode', [
2024-08-15 03:42:41 +02:00
'username' => $user->getUserIdentifier(),
2024-08-16 14:19:59 +02:00
'ldhName' => $ldhName,
2024-08-15 03:42:41 +02:00
]);
2024-08-15 03:04:31 +02:00
2024-08-16 14:19:59 +02:00
throw new AccessDeniedHttpException("It is forbidden to register the same domain name twice in your watchlists with limited mode ($ldhName)");
2024-08-15 03:42:41 +02:00
}
}
if (null !== $watchList->getWebhookDsn() && count($watchList->getWebhookDsn()) > (int) $this->getParameter('limit_max_watchlist_webhooks')) {
$this->logger->notice('User {username} tried to update a Watchlist. The maximum number of webhooks has been reached.', [
'username' => $user->getUserIdentifier(),
]);
throw new AccessDeniedHttpException('You have exceeded the maximum number of webhooks allowed in this Watchlist');
}
2024-08-15 03:42:41 +02:00
}
$this->chatNotificationService->sendChatNotification($watchList, new TestChatNotification());
$this->verifyConnector($watchList, $watchList->getConnector());
$this->logger->info('User {username} updates a Watchlist ({token}).', [
2024-08-04 14:45:27 +02:00
'username' => $user->getUserIdentifier(),
'token' => $watchList->getToken(),
2024-08-04 14:45:27 +02:00
]);
$this->em->beginTransaction();
/** @var WatchList $oldWatchlist */
$oldWatchlist = $this->em->getReference(WatchList::class, $watchList->getToken());
$this->em->lock($oldWatchlist, LockMode::PESSIMISTIC_WRITE);
$this->em->remove($oldWatchlist);
2024-08-15 03:04:31 +02:00
$this->em->flush();
2024-07-18 13:40:49 +02:00
$this->em->persist($watchList);
$this->em->flush();
$this->em->commit();
2024-07-18 13:40:49 +02:00
return $watchList;
}
2024-08-01 14:37:23 +02:00
/**
* @throws ParseException
* @throws EofException
* @throws InvalidDataException
2024-08-02 23:24:52 +02:00
* @throws \Exception
2024-08-01 14:37:23 +02:00
*/
#[Route(
path: '/api/watchlists/{token}/calendar',
name: 'watchlist_calendar',
defaults: [
'_api_resource_class' => WatchList::class,
'_api_operation_name' => 'calendar',
]
)]
public function getWatchlistCalendar(string $token): Response
{
2024-08-02 01:06:49 +02:00
/** @var WatchList $watchList */
2024-08-02 23:24:52 +02:00
$watchList = $this->watchListRepository->findOneBy(['token' => $token]);
2024-08-01 14:37:23 +02:00
$calendar = new Calendar();
/** @var Domain $domain */
2024-08-01 14:37:23 +02:00
foreach ($watchList->getDomains()->getIterator() as $domain) {
$attendees = [];
/* @var DomainEntity $entity */
foreach ($domain->getDomainEntities()->filter(fn (DomainEntity $domainEntity) => !$domainEntity->getDeleted())->getIterator() as $domainEntity) {
2025-01-01 02:57:53 +01:00
$jCard = $domainEntity->getEntity()->getJCard();
if (empty($jCard)) {
continue;
}
$vCardData = Reader::readJson($jCard);
if (empty($vCardData->EMAIL) || empty($vCardData->FN)) {
continue;
2024-08-02 23:24:52 +02:00
}
$email = (string) $vCardData->EMAIL;
if (!filter_var($email, FILTER_VALIDATE_EMAIL)) {
continue;
}
$attendees[] = (new Attendee(new EmailAddress($email)))->setDisplayName((string) $vCardData->FN);
2024-08-01 14:37:23 +02:00
}
/** @var DomainEvent $event */
2024-09-02 22:20:03 +02:00
foreach ($domain->getEvents()->filter(fn (DomainEvent $e) => $e->getDate()->diff(new \DateTimeImmutable('now'))->y <= 10)->getIterator() as $event) {
2024-08-01 14:37:23 +02:00
$calendar->addEvent((new Event())
->setLastModified(new Timestamp($domain->getUpdatedAt()))
->setStatus(EventStatus::CONFIRMED())
->setSummary($domain->getLdhName().': '.$event->getAction())
2024-08-01 14:37:23 +02:00
->addCategory(new Category($event->getAction()))
->setAttendees($attendees)
->setOccurrence(new SingleDay(new Date($event->getDate())))
);
}
$expiresInDays = $domain->getExpiresInDays();
if (null === $expiresInDays) {
continue;
}
$calendar->addEvent((new Event())
->setLastModified(new Timestamp($domain->getUpdatedAt()))
->setStatus(EventStatus::CONFIRMED())
->setSummary($domain->getLdhName().': estimated WHOIS release date')
->addCategory(new Category('release'))
->setAttendees($attendees)
->setOccurrence(new SingleDay(new Date(
(new \DateTimeImmutable())->setTime(0, 0)->add(new \DateInterval('P'.$expiresInDays.'D'))
)))
);
2024-08-01 14:37:23 +02:00
}
2024-08-03 18:05:05 +02:00
$calendarResponse = (new CalendarFactory())->createCalendar($calendar);
$calendarName = $watchList->getName();
if (null !== $calendarName) {
$calendarResponse->withProperty(new Property('X-WR-CALNAME', new TextValue($calendarName)));
}
return new Response($calendarResponse, Response::HTTP_OK, [
2024-08-02 23:24:52 +02:00
'Content-Type' => 'text/calendar; charset=utf-8',
2024-08-01 14:37:23 +02:00
]);
}
2024-09-09 11:31:33 +02:00
/**
* @throws \Exception
*/
2024-08-01 14:37:23 +02:00
#[Route(
2024-09-09 11:31:33 +02:00
path: '/api/tracked',
name: 'watchlist_get_tracked_domains',
2024-08-01 14:37:23 +02:00
defaults: [
'_api_resource_class' => WatchList::class,
2024-09-09 11:31:33 +02:00
'_api_operation_name' => 'get_tracked_domains',
]
2024-08-01 14:37:23 +02:00
)]
2024-09-09 11:31:33 +02:00
public function getTrackedDomains(): array
2024-08-01 14:37:23 +02:00
{
/** @var User $user */
$user = $this->getUser();
2024-08-02 23:24:52 +02:00
2024-09-09 11:31:33 +02:00
$domains = [];
/** @var WatchList $watchList */
foreach ($user->getWatchLists()->getIterator() as $watchList) {
/** @var Domain $domain */
foreach ($watchList->getDomains()->getIterator() as $domain) {
/** @var DomainEvent|null $exp */
$exp = $domain->getEvents()->findFirst(fn (int $key, DomainEvent $e) => !$e->getDeleted() && 'expiration' === $e->getAction());
if (!$domain->getDeleted() && null !== $exp && !in_array($domain, $domains)) {
2024-09-09 11:31:33 +02:00
$domains[] = $domain;
}
}
}
usort($domains, fn (Domain $d1, Domain $d2) => $d1->getExpiresInDays() - $d2->getExpiresInDays());
2024-09-09 11:31:33 +02:00
return $domains;
2024-08-01 14:37:23 +02:00
}
/**
* @throws TransportExceptionInterface
* @throws ServerExceptionInterface
* @throws RedirectionExceptionInterface
* @throws DecodingExceptionInterface
* @throws ClientExceptionInterface
* @throws \JsonException
*/
private function registerDomainsInWatchlist(string $content, array $groups): WatchList
{
/** @var WatchList $watchList */
$watchList = $this->serializer->deserialize($content, WatchList::class, 'json', ['groups' => $groups]);
$data = json_decode($content, true, 512, JSON_THROW_ON_ERROR);
if (!is_array($data) || !isset($data['domains']) || !is_array($data['domains'])) {
throw new BadRequestHttpException('Invalid payload: missing or invalid "domains" field.');
}
$domains = array_map(fn (string $d) => str_replace('/api/domains/', '', $d), $data['domains']);
foreach ($domains as $ldhName) {
/** @var ?Domain $domain */
$domain = $this->domainRepository->findOneBy(['ldhName' => $ldhName]);
if (null === $domain) {
$domain = $this->RDAPService->registerDomain($ldhName);
if (false === $this->kernel->isDebug() && true === $this->getParameter('limited_features')) {
$limiter = $this->rdapRequestsLimiter->create($this->getUser()->getUserIdentifier());
$limit = $limiter->consume();
if (!$limit->isAccepted()) {
throw new TooManyRequestsHttpException($limit->getRetryAfter()->getTimestamp() - time());
}
}
}
$watchList->addDomain($domain);
}
return $watchList;
}
2024-08-02 23:24:52 +02:00
}