mirror of
https://github.com/maelgangloff/domain-watchdog.git
synced 2025-12-29 16:15:04 +00:00
feat: only a compatible connector can be linked to a Watchlist
This commit is contained in:
@@ -7,7 +7,7 @@ export const helpGetTokenLink = (provider?: string) => {
|
|||||||
switch (provider) {
|
switch (provider) {
|
||||||
case ConnectorProvider.OVH:
|
case ConnectorProvider.OVH:
|
||||||
return <Typography.Link target='_blank'
|
return <Typography.Link target='_blank'
|
||||||
href="https://api.ovh.com/createToken/index.cgi?GET=/order/cart&GET=/order/cart/*&POST=/order/cart&POST=/order/cart/*&DELETE=/order/cart/*">
|
href="https://api.ovh.com/createToken/?GET=/order/cart&GET=/order/cart/*&POST=/order/cart&POST=/order/cart/*&DELETE=/order/cart/*&GET=/domain/extensions">
|
||||||
{t`Retrieve a set of tokens from your customer account on the Provider's website`}
|
{t`Retrieve a set of tokens from your customer account on the Provider's website`}
|
||||||
</Typography.Link>
|
</Typography.Link>
|
||||||
|
|
||||||
|
|||||||
@@ -3,6 +3,7 @@
|
|||||||
namespace App\Config\Connector;
|
namespace App\Config\Connector;
|
||||||
|
|
||||||
use App\Entity\Domain;
|
use App\Entity\Domain;
|
||||||
|
use App\Entity\Tld;
|
||||||
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
||||||
|
|
||||||
interface ConnectorInterface
|
interface ConnectorInterface
|
||||||
@@ -12,4 +13,6 @@ interface ConnectorInterface
|
|||||||
public function orderDomain(Domain $domain, bool $dryRun): void;
|
public function orderDomain(Domain $domain, bool $dryRun): void;
|
||||||
|
|
||||||
public static function verifyAuthData(array $authData, HttpClientInterface $client): array;
|
public static function verifyAuthData(array $authData, HttpClientInterface $client): array;
|
||||||
|
|
||||||
|
public function isSupported(Tld ...$tld): bool;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,18 +3,22 @@
|
|||||||
namespace App\Config\Connector;
|
namespace App\Config\Connector;
|
||||||
|
|
||||||
use App\Entity\Domain;
|
use App\Entity\Domain;
|
||||||
|
use App\Entity\Tld;
|
||||||
use http\Exception\InvalidArgumentException;
|
use http\Exception\InvalidArgumentException;
|
||||||
use Symfony\Component\HttpClient\HttpOptions;
|
use Symfony\Component\HttpClient\HttpOptions;
|
||||||
use Symfony\Component\HttpFoundation\Response;
|
use Symfony\Component\HttpFoundation\Response;
|
||||||
use Symfony\Component\HttpKernel\Exception\BadRequestHttpException;
|
use Symfony\Component\HttpKernel\Exception\BadRequestHttpException;
|
||||||
use Symfony\Component\HttpKernel\Exception\HttpException;
|
use Symfony\Component\HttpKernel\Exception\HttpException;
|
||||||
|
use Symfony\Contracts\HttpClient\Exception\ClientExceptionInterface;
|
||||||
use Symfony\Contracts\HttpClient\Exception\DecodingExceptionInterface;
|
use Symfony\Contracts\HttpClient\Exception\DecodingExceptionInterface;
|
||||||
|
use Symfony\Contracts\HttpClient\Exception\RedirectionExceptionInterface;
|
||||||
|
use Symfony\Contracts\HttpClient\Exception\ServerExceptionInterface;
|
||||||
use Symfony\Contracts\HttpClient\Exception\TransportExceptionInterface;
|
use Symfony\Contracts\HttpClient\Exception\TransportExceptionInterface;
|
||||||
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
||||||
|
|
||||||
readonly class GandiConnector implements ConnectorInterface
|
readonly class GandiConnector implements ConnectorInterface
|
||||||
{
|
{
|
||||||
private const BASE_URL = 'https://api.gandi.net/v5';
|
private const BASE_URL = 'https://api.gandi.net';
|
||||||
|
|
||||||
public function __construct(private array $authData, private HttpClientInterface $client)
|
public function __construct(private array $authData, private HttpClientInterface $client)
|
||||||
{
|
{
|
||||||
@@ -130,4 +134,33 @@ readonly class GandiConnector implements ConnectorInterface
|
|||||||
|
|
||||||
return $authDataReturned;
|
return $authDataReturned;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @throws TransportExceptionInterface
|
||||||
|
* @throws ServerExceptionInterface
|
||||||
|
* @throws RedirectionExceptionInterface
|
||||||
|
* @throws DecodingExceptionInterface
|
||||||
|
* @throws ClientExceptionInterface
|
||||||
|
*/
|
||||||
|
public function isSupported(Tld ...$tldList): bool
|
||||||
|
{
|
||||||
|
$authData = self::verifyAuthData($this->authData, $this->client);
|
||||||
|
|
||||||
|
$response = $this->client->request('GET', '/v5/domain/tlds', (new HttpOptions())
|
||||||
|
->setAuthBearer($authData['token'])
|
||||||
|
->setHeader('Accept', 'application/json')
|
||||||
|
->setBaseUri(self::BASE_URL)
|
||||||
|
->toArray())->toArray();
|
||||||
|
|
||||||
|
$supportedTldList = array_map(fn ($tld) => $tld['name'], $response);
|
||||||
|
|
||||||
|
/** @var string $tldString */
|
||||||
|
foreach (array_unique(array_map(fn (Tld $tld) => $tld->getTld(), $tldList)) as $tldString) {
|
||||||
|
if (!in_array($tldString, $supportedTldList)) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,7 +3,10 @@
|
|||||||
namespace App\Config\Connector;
|
namespace App\Config\Connector;
|
||||||
|
|
||||||
use App\Entity\Domain;
|
use App\Entity\Domain;
|
||||||
|
use App\Entity\Tld;
|
||||||
|
use GuzzleHttp\Exception\ClientException;
|
||||||
use Ovh\Api;
|
use Ovh\Api;
|
||||||
|
use Ovh\Exceptions\InvalidParameterException;
|
||||||
use Symfony\Component\HttpKernel\Exception\BadRequestHttpException;
|
use Symfony\Component\HttpKernel\Exception\BadRequestHttpException;
|
||||||
use Symfony\Component\HttpKernel\Exception\HttpException;
|
use Symfony\Component\HttpKernel\Exception\HttpException;
|
||||||
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
||||||
@@ -11,10 +14,15 @@ use Symfony\Contracts\HttpClient\HttpClientInterface;
|
|||||||
readonly class OvhConnector implements ConnectorInterface
|
readonly class OvhConnector implements ConnectorInterface
|
||||||
{
|
{
|
||||||
public const REQUIRED_ROUTES = [
|
public const REQUIRED_ROUTES = [
|
||||||
|
[
|
||||||
|
'method' => 'GET',
|
||||||
|
'path' => '/domain/extensions',
|
||||||
|
],
|
||||||
[
|
[
|
||||||
'method' => 'GET',
|
'method' => 'GET',
|
||||||
'path' => '/order/cart',
|
'path' => '/order/cart',
|
||||||
], [
|
],
|
||||||
|
[
|
||||||
'method' => 'GET',
|
'method' => 'GET',
|
||||||
'path' => '/order/cart/*',
|
'path' => '/order/cart/*',
|
||||||
],
|
],
|
||||||
@@ -162,14 +170,18 @@ readonly class OvhConnector implements ConnectorInterface
|
|||||||
$consumerKey
|
$consumerKey
|
||||||
);
|
);
|
||||||
|
|
||||||
$res = $conn->get('/auth/currentCredential');
|
try {
|
||||||
if (null !== $res['expiration'] && new \DateTime($res['expiration']) < new \DateTime()) {
|
$res = $conn->get('/auth/currentCredential');
|
||||||
throw new \Exception('These credentials have expired');
|
if (null !== $res['expiration'] && new \DateTime($res['expiration']) < new \DateTime()) {
|
||||||
}
|
throw new BadRequestHttpException('These credentials have expired');
|
||||||
|
}
|
||||||
|
|
||||||
$status = $res['status'];
|
$status = $res['status'];
|
||||||
if ('validated' !== $status) {
|
if ('validated' !== $status) {
|
||||||
throw new \Exception("The status of these credentials is not valid ($status)");
|
throw new BadRequestHttpException("The status of these credentials is not valid ($status)");
|
||||||
|
}
|
||||||
|
} catch (ClientException $exception) {
|
||||||
|
throw new BadRequestHttpException($exception->getMessage());
|
||||||
}
|
}
|
||||||
|
|
||||||
foreach (self::REQUIRED_ROUTES as $requiredRoute) {
|
foreach (self::REQUIRED_ROUTES as $requiredRoute) {
|
||||||
@@ -201,4 +213,34 @@ readonly class OvhConnector implements ConnectorInterface
|
|||||||
'waiveRetractationPeriod' => $waiveRetractationPeriod,
|
'waiveRetractationPeriod' => $waiveRetractationPeriod,
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @throws InvalidParameterException
|
||||||
|
* @throws \JsonException
|
||||||
|
* @throws \Exception
|
||||||
|
*/
|
||||||
|
public function isSupported(Tld ...$tldList): bool
|
||||||
|
{
|
||||||
|
$authData = self::verifyAuthData($this->authData, $this->client);
|
||||||
|
|
||||||
|
$conn = new Api(
|
||||||
|
$authData['appKey'],
|
||||||
|
$authData['appSecret'],
|
||||||
|
$authData['apiEndpoint'],
|
||||||
|
$authData['consumerKey']
|
||||||
|
);
|
||||||
|
|
||||||
|
$supportedTldList = $conn->get('/domain/extensions', [
|
||||||
|
'ovhSubsidiary' => $authData['ovhSubsidiary'],
|
||||||
|
]);
|
||||||
|
|
||||||
|
/** @var string $tldString */
|
||||||
|
foreach (array_unique(array_map(fn (Tld $tld) => $tld->getTld(), $tldList)) as $tldString) {
|
||||||
|
if (!in_array($tldString, $supportedTldList)) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -12,7 +12,6 @@ use Symfony\Bundle\FrameworkBundle\Controller\AbstractController;
|
|||||||
use Symfony\Component\HttpFoundation\Request;
|
use Symfony\Component\HttpFoundation\Request;
|
||||||
use Symfony\Component\Routing\Attribute\Route;
|
use Symfony\Component\Routing\Attribute\Route;
|
||||||
use Symfony\Component\Serializer\SerializerInterface;
|
use Symfony\Component\Serializer\SerializerInterface;
|
||||||
use Symfony\Contracts\HttpClient\Exception\TransportExceptionInterface;
|
|
||||||
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
||||||
|
|
||||||
class ConnectorController extends AbstractController
|
class ConnectorController extends AbstractController
|
||||||
@@ -43,7 +42,6 @@ class ConnectorController extends AbstractController
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* @throws \Exception
|
* @throws \Exception
|
||||||
* @throws TransportExceptionInterface
|
|
||||||
*/
|
*/
|
||||||
#[Route(
|
#[Route(
|
||||||
path: '/api/connectors',
|
path: '/api/connectors',
|
||||||
|
|||||||
@@ -2,7 +2,9 @@
|
|||||||
|
|
||||||
namespace App\Controller;
|
namespace App\Controller;
|
||||||
|
|
||||||
|
use App\Config\Connector\ConnectorInterface;
|
||||||
use App\Config\WebhookScheme;
|
use App\Config\WebhookScheme;
|
||||||
|
use App\Entity\Connector;
|
||||||
use App\Entity\Domain;
|
use App\Entity\Domain;
|
||||||
use App\Entity\DomainEntity;
|
use App\Entity\DomainEntity;
|
||||||
use App\Entity\DomainEvent;
|
use App\Entity\DomainEvent;
|
||||||
@@ -40,6 +42,7 @@ use Symfony\Component\Notifier\Transport\AbstractTransportFactory;
|
|||||||
use Symfony\Component\Notifier\Transport\Dsn;
|
use Symfony\Component\Notifier\Transport\Dsn;
|
||||||
use Symfony\Component\Routing\Attribute\Route;
|
use Symfony\Component\Routing\Attribute\Route;
|
||||||
use Symfony\Component\Serializer\SerializerInterface;
|
use Symfony\Component\Serializer\SerializerInterface;
|
||||||
|
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
||||||
|
|
||||||
class WatchListController extends AbstractController
|
class WatchListController extends AbstractController
|
||||||
{
|
{
|
||||||
@@ -47,40 +50,10 @@ class WatchListController extends AbstractController
|
|||||||
private readonly SerializerInterface $serializer,
|
private readonly SerializerInterface $serializer,
|
||||||
private readonly EntityManagerInterface $em,
|
private readonly EntityManagerInterface $em,
|
||||||
private readonly WatchListRepository $watchListRepository,
|
private readonly WatchListRepository $watchListRepository,
|
||||||
private readonly LoggerInterface $logger
|
private readonly LoggerInterface $logger, private readonly HttpClientInterface $httpClient
|
||||||
) {
|
) {
|
||||||
}
|
}
|
||||||
|
|
||||||
private function verifyWebhookDSN(WatchList $watchList): void
|
|
||||||
{
|
|
||||||
if (null !== $watchList->getWebhookDsn()) {
|
|
||||||
foreach ($watchList->getWebhookDsn() as $dsnString) {
|
|
||||||
try {
|
|
||||||
$dsn = new Dsn($dsnString);
|
|
||||||
} catch (InvalidArgumentException $exception) {
|
|
||||||
throw new BadRequestHttpException($exception->getMessage());
|
|
||||||
}
|
|
||||||
|
|
||||||
$scheme = $dsn->getScheme();
|
|
||||||
$webhookScheme = WebhookScheme::tryFrom($scheme);
|
|
||||||
|
|
||||||
if (null === $webhookScheme) {
|
|
||||||
throw new BadRequestHttpException("The DSN scheme ($scheme) is not supported");
|
|
||||||
}
|
|
||||||
|
|
||||||
$transportFactoryClass = $webhookScheme->getChatTransportFactory();
|
|
||||||
/** @var AbstractTransportFactory $transportFactory */
|
|
||||||
$transportFactory = new $transportFactoryClass();
|
|
||||||
|
|
||||||
try {
|
|
||||||
$transportFactory->create($dsn)->send((new TestChatNotification())->asChatMessage());
|
|
||||||
} catch (\Throwable $exception) {
|
|
||||||
throw new BadRequestHttpException($exception->getMessage());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @throws \Exception
|
* @throws \Exception
|
||||||
*/
|
*/
|
||||||
@@ -147,8 +120,8 @@ class WatchListController extends AbstractController
|
|||||||
}
|
}
|
||||||
|
|
||||||
$this->verifyWebhookDSN($watchList);
|
$this->verifyWebhookDSN($watchList);
|
||||||
|
$this->verifyConnector($watchList, $watchList->getConnector());
|
||||||
|
|
||||||
$user = $this->getUser();
|
|
||||||
$this->logger->info('User {username} registers a Watchlist ({token}).', [
|
$this->logger->info('User {username} registers a Watchlist ({token}).', [
|
||||||
'username' => $user->getUserIdentifier(),
|
'username' => $user->getUserIdentifier(),
|
||||||
'token' => $watchList->getToken(),
|
'token' => $watchList->getToken(),
|
||||||
@@ -177,6 +150,78 @@ class WatchListController extends AbstractController
|
|||||||
return $user->getWatchLists();
|
return $user->getWatchLists();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private function verifyWebhookDSN(WatchList $watchList): void
|
||||||
|
{
|
||||||
|
if (null !== $watchList->getWebhookDsn()) {
|
||||||
|
foreach ($watchList->getWebhookDsn() as $dsnString) {
|
||||||
|
try {
|
||||||
|
$dsn = new Dsn($dsnString);
|
||||||
|
} catch (InvalidArgumentException $exception) {
|
||||||
|
throw new BadRequestHttpException($exception->getMessage());
|
||||||
|
}
|
||||||
|
|
||||||
|
$scheme = $dsn->getScheme();
|
||||||
|
$webhookScheme = WebhookScheme::tryFrom($scheme);
|
||||||
|
|
||||||
|
if (null === $webhookScheme) {
|
||||||
|
throw new BadRequestHttpException("The DSN scheme ($scheme) is not supported");
|
||||||
|
}
|
||||||
|
|
||||||
|
$transportFactoryClass = $webhookScheme->getChatTransportFactory();
|
||||||
|
/** @var AbstractTransportFactory $transportFactory */
|
||||||
|
$transportFactory = new $transportFactoryClass();
|
||||||
|
|
||||||
|
try {
|
||||||
|
$transportFactory->create($dsn)->send((new TestChatNotification())->asChatMessage());
|
||||||
|
} catch (\Throwable $exception) {
|
||||||
|
throw new BadRequestHttpException($exception->getMessage());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @throws \Exception
|
||||||
|
*/
|
||||||
|
private function verifyConnector(WatchList $watchList, ?Connector $connector): void
|
||||||
|
{
|
||||||
|
/** @var User $user */
|
||||||
|
$user = $this->getUser();
|
||||||
|
|
||||||
|
if (null !== $connector) {
|
||||||
|
if (!$user->getConnectors()->contains($connector)) {
|
||||||
|
$this->logger->notice('The Connector ({connector}) does not belong to the user.', [
|
||||||
|
'username' => $user->getUserIdentifier(),
|
||||||
|
'connector' => $connector->getId(),
|
||||||
|
]);
|
||||||
|
throw new AccessDeniedHttpException('You cannot create a Watchlist with a connector that does not belong to you');
|
||||||
|
}
|
||||||
|
|
||||||
|
$connectorProviderClass = $connector->getProvider()->getConnectorProvider();
|
||||||
|
/** @var ConnectorInterface $connectorProvider */
|
||||||
|
$connectorProvider = new $connectorProviderClass($connector->getAuthData(), $this->httpClient);
|
||||||
|
|
||||||
|
$tldList = [];
|
||||||
|
/** @var Domain $domain */
|
||||||
|
foreach ($watchList->getDomains()->getIterator() as $domain) {
|
||||||
|
$tld = $domain->getTld();
|
||||||
|
if (!in_array($tld, $tldList)) {
|
||||||
|
$tldList[] = $tld;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
$supported = $connectorProvider->isSupported(...$tldList);
|
||||||
|
|
||||||
|
if (!$supported) {
|
||||||
|
$this->logger->notice('The Connector ({connector}) does not support all TLDs in this Watchlist', [
|
||||||
|
'username' => $user->getUserIdentifier(),
|
||||||
|
'connector' => $connector->getId(),
|
||||||
|
]);
|
||||||
|
throw new BadRequestHttpException('This connector does not support all TLDs in this Watchlist');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @throws ORMException
|
* @throws ORMException
|
||||||
* @throws \Exception
|
* @throws \Exception
|
||||||
@@ -233,6 +278,7 @@ class WatchListController extends AbstractController
|
|||||||
}
|
}
|
||||||
|
|
||||||
$this->verifyWebhookDSN($watchList);
|
$this->verifyWebhookDSN($watchList);
|
||||||
|
$this->verifyConnector($watchList, $watchList->getConnector());
|
||||||
|
|
||||||
$this->logger->info('User {username} updates a Watchlist ({token}).', [
|
$this->logger->info('User {username} updates a Watchlist ({token}).', [
|
||||||
'username' => $user->getUserIdentifier(),
|
'username' => $user->getUserIdentifier(),
|
||||||
|
|||||||
Reference in New Issue
Block a user