SensiolabHelper   A
last analyzed

Complexity

Total Complexity 23

Size/Duplication

Total Lines 204
Duplicated Lines 0 %

Coupling/Cohesion

Components 1
Dependencies 7

Test Coverage

Coverage 98.15%

Importance

Changes 0
Metric Value
wmc 23
lcom 1
cbo 7
dl 0
loc 204
ccs 106
cts 108
cp 0.9815
rs 10
c 0
b 0
f 0

7 Methods

Rating   Name   Duplication   Size   Complexity  
A __construct() 0 5 1
B getSensiolabVulnerabilties() 0 58 6
B parseVulnerability() 0 27 2
A checkResponse() 0 10 2
A addVerboseLog() 0 11 3
B printMessage() 0 23 6
A getColorTagForStatusCode() 0 10 3
1
<?php
2
/**
3
 * Created by PhpStorm.
4
 * User: Alessandro
5
 * Date: 02/12/2015
6
 * Time: 13:47
7
 */
8
9
namespace Padosoft\LaravelComposerSecurity;
10
11
use Illuminate\Console\Command;
12
use GuzzleHttp\Client;
13
14
class SensiolabHelper
15
{
16
17
    protected $guzzle;
18
19
    protected $command;
20
21
    protected $tableVulnerabilities = [];
22
23
    /**
24
     * SensiolabHelper constructor.
25
     * @param Client $objguzzle
26
     * @param Command $objcommand
27
     */
28 26
    public function __construct(Client $objguzzle, Command $objcommand)
29
    {
30 26
        $this->guzzle = $objguzzle;
31 26
        $this->command = $objcommand;
32 26
    }
33
34
    /**
35
     *
36
     * Send Request to sensiolab and return array of sensiolab vulnerabilities.
37
     * Empty array if here is no vulnerabilities.
38
     *
39
     * @param $fileLock path to composer.lock file.
40
     *
41
     * @return array
42
     */
43 24
    public function getSensiolabVulnerabilties($fileLock)
44
    {
45 24
        $this->addVerboseLog('Send request to sensiolab: <info>' . $fileLock . '</info>');
46
47 24
        $debug = false;//set to true to log into console output
48
        $headers = [
49
            //OPTIONS
50
            'allow_redirects' => [
51 24
                'max' => 3,        // allow at most 10 redirects.
52 24
                'strict' => true,      // use "strict" RFC compliant redirects.
53 24
                'referer' => true,      // add a Referer header
54 24
                'protocols' => ['http', 'https'], // only allow http and https URLs
55
                'track_redirects' => false
56 24
            ],
57 24
            'connect_timeout' => 20,//Use 0 to wait connection indefinitely
58 24
            'timeout' => 30, //Use 0 to wait response indefinitely
59 24
            'debug' => $debug,
60
            //HEADERS
61
            'headers' => [
62
                'Accept' => 'application/json'
63 24
            ],
64
            //UPLOAD FORM FILE
65
            'multipart' => [
66
                [
67 24
                    'name' => 'lock',
68 24
                    'contents' => fopen($fileLock, 'r')
69 24
                ]
70 24
            ]
71 24
        ];
72 24
        $response = null;
73
74
        try {
75 24
            $iResponse = $this->guzzle->request('POST', 'https://security.sensiolabs.org/check_lock', $headers);
76 18
            $responseBody = $iResponse->getBody()->getContents();
77 18
            $response = json_decode($responseBody, true);
78 24
        } catch (\GuzzleHttp\Exception\ClientException $e) {
79 4
            $this->command->error("ClientException!\nMessage: " . $e->getMessage());
80 4
            $colorTag = $this->getColorTagForStatusCode($e->getResponse()->getStatusCode());
81 4
            $this->command->line("HTTP StatusCode: <{$colorTag}>" . $e->getResponse()->getStatusCode() . "<{$colorTag}>");
82 4
            $resp = $e->getResponse();
83 4
            if ($resp !== null) {
84 4
                $this->printMessage($resp);
85 4
            }
86 4
            $this->printMessage($e->getRequest());
87 6
        } catch (\GuzzleHttp\Exception\RequestException $e) {
88 4
            $this->command->error("RequestException!\nMessage: " . $e->getMessage());
89 4
            $this->printMessage($e->getRequest());
90 4
            if ($e->hasResponse()) {
91 2
                $colorTag = $this->getColorTagForStatusCode($e->getResponse()->getStatusCode());
92 2
                $this->command->line("HTTP StatusCode: <{$colorTag}>" . $e->getResponse()->getStatusCode() . "<{$colorTag}>");
93 2
                $resp = $e->getResponse();
94 2
                if ($resp !== null) {
95 2
                    $this->printMessage($resp);
96 2
                }
97 2
            }
98
        }
99 24
        return $response;
100
    }
101
102
    /**
103
     * @param $name
104
     * @param $vulnerability
105
     * @return array
106
     */
107 12
    public function parseVulnerability($name, $vulnerability)
108
    {
109
        $data = [
110 12
            'name' => $name,
111 12
            'version' => $vulnerability['version'],
112 12
            'advisories' => array_values($vulnerability['advisories'])
113 12
        ];
114 12
        unset($this->tableVulnerabilities);
115 12
        foreach ($data['advisories'] as $key2 => $advisory) {
116
            $data2 = [
117 12
                'title' => $advisory['title'],
118 12
                'link' => $advisory['link'],
119 12
                'cve' => $advisory['cve']
120 12
            ];
121
122
            $dataTable = [
123 12
                'name' => $data['name'],
124 12
                'version' => $data['version'],
125 12
                'advisories' => $data2["title"]
126 12
            ];
127
128 12
            $this->addVerboseLog($data['name'] . " " . $data['version'] . " " . $data2["title"], true);
129 12
            $this->tableVulnerabilities[] = $dataTable;
130 12
        }
131
132 12
        return $this->tableVulnerabilities;
133
    }
134
135
    /**
136
     * @param $key
137
     * @param $vulnerability
138
     * @param bool $tuttoOk
139
     * @return array
140
     */
141 10
    public function checkResponse($key, $vulnerability, $tuttoOk)
142
    {
143 10
        $tableVulnerabilities = array();
144
145 10
        foreach ($this->parseVulnerability($key, $vulnerability) as $vul) {
146 10
            $tableVulnerabilities[] = array_merge($vul, array('isOk' => $tuttoOk));
147 10
        }
148
149 10
        return $tableVulnerabilities;
150
    }
151
152
    /**
153
     * @param string $msg
154
     * @param bool|false $error
155
     */
156 26
    private function addVerboseLog($msg, $error = false)
157
    {
158 26
        $verbose = $this->command->option('verbose');
159 26
        if ($verbose) {
160 10
            if ($error) {
161 2
                $this->command->error($msg);
162 2
            } else {
163 8
                $this->command->line($msg);
164
            }
165 10
        }
166 26
    }
167
168
    /**
169
     * @param \Psr\Http\Message\MessageInterface $message
170
     *
171
     * @throws \RuntimeException
172
     */
173 6
    private function printMessage(\Psr\Http\Message\MessageInterface $message)
174
    {
175 6
        $type = '';
176 6
        $body = '';
177 6
        if (is_a($message, '\Psr\Http\Message\RequestInterface')) {
178 6
            $type = 'REQUEST';
179 6
            $body = $message->getBody();
180 6
        } elseif (is_a($message, '\Psr\Http\Message\ResponseInterface')) {
181 6
            $type = 'RESPONSE';
182 6
            $body = $message->getBody()->getContents();
183 6
        }
184 6
        $this->command->info("$type:");
185 6
        $headers = '';
186 6
        foreach ($message->getHeaders() as $name => $values) {
187
            $headers .= $name . ': ' . implode(', ', $values) . "\r\n";
188 6
        }
189 6
        $this->command->comment($headers);
190 6
        if ($type == 'REQUEST') {
191 6
            $this->command->comment($body);
192 6
        } elseif ($type == 'RESPONSE') {
193 6
            $this->command->comment($body);
194 6
        }
195 6
    }
196
197
198
    /**
199
     * Get the color tag for the given status code.
200
     *
201
     * @param string $code
202
     *
203
     * @return string
204
     *
205
     * @see https://github.com/spatie/http-status-check/blob/master/src/CrawlLogger.php#L96
206
     */
207 6
    protected function getColorTagForStatusCode($code)
208
    {
209 6
        if (starts_with($code, '2')) {
210 2
            return 'info';
211
        }
212 4
        if (starts_with($code, '3')) {
213
            return 'comment';
214
        }
215 4
        return 'error';
216
    }
217
}
218