109 lines
3.6 KiB
PHP
109 lines
3.6 KiB
PHP
|
<?php
|
||
|
|
||
|
/*
|
||
|
* This file is part of the Symfony package.
|
||
|
*
|
||
|
* (c) Fabien Potencier <fabien@symfony.com>
|
||
|
*
|
||
|
* For the full copyright and license information, please view the LICENSE
|
||
|
* file that was distributed with this source code.
|
||
|
*/
|
||
|
|
||
|
namespace Symfony\Component\Validator\Constraints;
|
||
|
|
||
|
use Symfony\Component\HttpClient\HttpClient;
|
||
|
use Symfony\Component\Validator\Constraint;
|
||
|
use Symfony\Component\Validator\ConstraintValidator;
|
||
|
use Symfony\Component\Validator\Exception\LogicException;
|
||
|
use Symfony\Component\Validator\Exception\UnexpectedTypeException;
|
||
|
use Symfony\Component\Validator\Exception\UnexpectedValueException;
|
||
|
use Symfony\Contracts\HttpClient\Exception\ExceptionInterface;
|
||
|
use Symfony\Contracts\HttpClient\HttpClientInterface;
|
||
|
|
||
|
/**
|
||
|
* Checks if a password has been leaked in a data breach using haveibeenpwned.com's API.
|
||
|
* Use a k-anonymity model to protect the password being searched for.
|
||
|
*
|
||
|
* @see https://haveibeenpwned.com/API/v2#SearchingPwnedPasswordsByRange
|
||
|
*
|
||
|
* @author Kévin Dunglas <dunglas@gmail.com>
|
||
|
*/
|
||
|
class NotCompromisedPasswordValidator extends ConstraintValidator
|
||
|
{
|
||
|
private const DEFAULT_API_ENDPOINT = 'https://api.pwnedpasswords.com/range/%s';
|
||
|
|
||
|
private HttpClientInterface $httpClient;
|
||
|
private string $charset;
|
||
|
private bool $enabled;
|
||
|
private string $endpoint;
|
||
|
|
||
|
public function __construct(?HttpClientInterface $httpClient = null, string $charset = 'UTF-8', bool $enabled = true, ?string $endpoint = null)
|
||
|
{
|
||
|
if (null === $httpClient && !class_exists(HttpClient::class)) {
|
||
|
throw new LogicException(sprintf('The "%s" class requires the "HttpClient" component. Try running "composer require symfony/http-client".', self::class));
|
||
|
}
|
||
|
|
||
|
$this->httpClient = $httpClient ?? HttpClient::create();
|
||
|
$this->charset = $charset;
|
||
|
$this->enabled = $enabled;
|
||
|
$this->endpoint = $endpoint ?? self::DEFAULT_API_ENDPOINT;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* @throws ExceptionInterface
|
||
|
*/
|
||
|
public function validate(mixed $value, Constraint $constraint): void
|
||
|
{
|
||
|
if (!$constraint instanceof NotCompromisedPassword) {
|
||
|
throw new UnexpectedTypeException($constraint, NotCompromisedPassword::class);
|
||
|
}
|
||
|
|
||
|
if (!$this->enabled) {
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
if (null !== $value && !\is_scalar($value) && !$value instanceof \Stringable) {
|
||
|
throw new UnexpectedValueException($value, 'string');
|
||
|
}
|
||
|
|
||
|
$value = (string) $value;
|
||
|
if ('' === $value) {
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
if ('UTF-8' !== $this->charset) {
|
||
|
$value = mb_convert_encoding($value, 'UTF-8', $this->charset);
|
||
|
}
|
||
|
|
||
|
$hash = strtoupper(sha1($value));
|
||
|
$hashPrefix = substr($hash, 0, 5);
|
||
|
$url = sprintf($this->endpoint, $hashPrefix);
|
||
|
|
||
|
try {
|
||
|
$result = $this->httpClient->request('GET', $url, ['headers' => ['Add-Padding' => 'true']])->getContent();
|
||
|
} catch (ExceptionInterface $e) {
|
||
|
if ($constraint->skipOnError) {
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
throw $e;
|
||
|
}
|
||
|
|
||
|
foreach (explode("\r\n", $result) as $line) {
|
||
|
if (!str_contains($line, ':')) {
|
||
|
continue;
|
||
|
}
|
||
|
|
||
|
[$hashSuffix, $count] = explode(':', $line);
|
||
|
|
||
|
if ($hashPrefix.$hashSuffix === $hash && $constraint->threshold <= (int) $count) {
|
||
|
$this->context->buildViolation($constraint->message)
|
||
|
->setCode(NotCompromisedPassword::COMPROMISED_PASSWORD_ERROR)
|
||
|
->addViolation();
|
||
|
|
||
|
return;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|