Initial Drupal 11 with DDEV setup
This commit is contained in:
		
							
								
								
									
										108
									
								
								vendor/symfony/validator/Constraints/NotCompromisedPasswordValidator.php
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										108
									
								
								vendor/symfony/validator/Constraints/NotCompromisedPasswordValidator.php
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@ -0,0 +1,108 @@
 | 
			
		||||
<?php
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * This file is part of the Symfony package.
 | 
			
		||||
 *
 | 
			
		||||
 * (c) Fabien Potencier <fabien@symfony.com>
 | 
			
		||||
 *
 | 
			
		||||
 * For the full copyright and license information, please view the LICENSE
 | 
			
		||||
 * file that was distributed with this source code.
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
namespace Symfony\Component\Validator\Constraints;
 | 
			
		||||
 | 
			
		||||
use Symfony\Component\HttpClient\HttpClient;
 | 
			
		||||
use Symfony\Component\Validator\Constraint;
 | 
			
		||||
use Symfony\Component\Validator\ConstraintValidator;
 | 
			
		||||
use Symfony\Component\Validator\Exception\LogicException;
 | 
			
		||||
use Symfony\Component\Validator\Exception\UnexpectedTypeException;
 | 
			
		||||
use Symfony\Component\Validator\Exception\UnexpectedValueException;
 | 
			
		||||
use Symfony\Contracts\HttpClient\Exception\ExceptionInterface;
 | 
			
		||||
use Symfony\Contracts\HttpClient\HttpClientInterface;
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
 * Checks if a password has been leaked in a data breach using haveibeenpwned.com's API.
 | 
			
		||||
 * Use a k-anonymity model to protect the password being searched for.
 | 
			
		||||
 *
 | 
			
		||||
 * @see https://haveibeenpwned.com/API/v2#SearchingPwnedPasswordsByRange
 | 
			
		||||
 *
 | 
			
		||||
 * @author Kévin Dunglas <dunglas@gmail.com>
 | 
			
		||||
 */
 | 
			
		||||
class NotCompromisedPasswordValidator extends ConstraintValidator
 | 
			
		||||
{
 | 
			
		||||
    private const DEFAULT_API_ENDPOINT = 'https://api.pwnedpasswords.com/range/%s';
 | 
			
		||||
 | 
			
		||||
    private HttpClientInterface $httpClient;
 | 
			
		||||
    private string $charset;
 | 
			
		||||
    private bool $enabled;
 | 
			
		||||
    private string $endpoint;
 | 
			
		||||
 | 
			
		||||
    public function __construct(?HttpClientInterface $httpClient = null, string $charset = 'UTF-8', bool $enabled = true, ?string $endpoint = null)
 | 
			
		||||
    {
 | 
			
		||||
        if (null === $httpClient && !class_exists(HttpClient::class)) {
 | 
			
		||||
            throw new LogicException(\sprintf('The "%s" class requires the "HttpClient" component. Try running "composer require symfony/http-client".', self::class));
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        $this->httpClient = $httpClient ?? HttpClient::create();
 | 
			
		||||
        $this->charset = $charset;
 | 
			
		||||
        $this->enabled = $enabled;
 | 
			
		||||
        $this->endpoint = $endpoint ?? self::DEFAULT_API_ENDPOINT;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /**
 | 
			
		||||
     * @throws ExceptionInterface
 | 
			
		||||
     */
 | 
			
		||||
    public function validate(mixed $value, Constraint $constraint): void
 | 
			
		||||
    {
 | 
			
		||||
        if (!$constraint instanceof NotCompromisedPassword) {
 | 
			
		||||
            throw new UnexpectedTypeException($constraint, NotCompromisedPassword::class);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!$this->enabled) {
 | 
			
		||||
            return;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (null !== $value && !\is_scalar($value) && !$value instanceof \Stringable) {
 | 
			
		||||
            throw new UnexpectedValueException($value, 'string');
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        $value = (string) $value;
 | 
			
		||||
        if ('' === $value) {
 | 
			
		||||
            return;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if ('UTF-8' !== $this->charset) {
 | 
			
		||||
            $value = mb_convert_encoding($value, 'UTF-8', $this->charset);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        $hash = strtoupper(sha1($value));
 | 
			
		||||
        $hashPrefix = substr($hash, 0, 5);
 | 
			
		||||
        $url = \sprintf($this->endpoint, $hashPrefix);
 | 
			
		||||
 | 
			
		||||
        try {
 | 
			
		||||
            $result = $this->httpClient->request('GET', $url, ['headers' => ['Add-Padding' => 'true']])->getContent();
 | 
			
		||||
        } catch (ExceptionInterface $e) {
 | 
			
		||||
            if ($constraint->skipOnError) {
 | 
			
		||||
                return;
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            throw $e;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        foreach (explode("\r\n", $result) as $line) {
 | 
			
		||||
            if (!str_contains($line, ':')) {
 | 
			
		||||
                continue;
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            [$hashSuffix, $count] = explode(':', $line);
 | 
			
		||||
 | 
			
		||||
            if ($hashPrefix.$hashSuffix === $hash && $constraint->threshold <= (int) $count) {
 | 
			
		||||
                $this->context->buildViolation($constraint->message)
 | 
			
		||||
                    ->setCode(NotCompromisedPassword::COMPROMISED_PASSWORD_ERROR)
 | 
			
		||||
                    ->addViolation();
 | 
			
		||||
 | 
			
		||||
                return;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
		Reference in New Issue
	
	Block a user