Completed
Push — master ( 7eec5f...b860e6 )
by Lorenzo
14:21
created

SensiolabHelper::checkResponse()   A

Complexity

Conditions 2
Paths 2

Size

Total Lines 10
Code Lines 5

Duplication

Lines 0
Ratio 0 %

Code Coverage

Tests 7
CRAP Score 2

Importance

Changes 1
Bugs 1 Features 1
Metric Value
c 1
b 1
f 1
dl 0
loc 10
ccs 7
cts 7
cp 1
rs 9.4286
cc 2
eloc 5
nc 2
nop 3
crap 2
1
<?php
2
/**
3
 * Created by PhpStorm.
4
 * User: Alessandro
5
 * Date: 02/12/2015
6
 * Time: 13:47
7
 */
8
9
namespace Padosoft\LaravelComposerSecurity;
10
11
use Illuminate\Console\Command;
12
use GuzzleHttp\Client;
13
14
class SensiolabHelper
15
{
16
17
    protected $guzzle;
18
19
    protected $command;
20
21
    protected $tableVulnerabilities = [];
22
23
    /**
24
     * SensiolabHelper constructor.
25
     * @param Client $objguzzle
26
     * @param Command $objcommand
27
     */
28 12
    public function __construct(Client $objguzzle, Command $objcommand)
29
    {
30 12
        $this->guzzle = $objguzzle;
31 12
        $this->command = $objcommand;
32 12
    }
33
34
    /**
35
     *
36
     * Send Request to sensiolab and return array of sensiolab vulnerabilities.
37
     * Empty array if here is no vulnerabilities.
38
     *
39
     * @param $fileLock path to composer.lock file.
40
     *
41
     * @return array
42
     */
43 10
    public function getSensiolabVulnerabilties($fileLock)
44
    {
45 10
        $this->addVerboseLog('Send request to sensiolab: <info>' . $fileLock . '</info>');
46
47 10
        $debug = false;//set to true to log into console output
48
        $headers = [
49
            //OPTIONS
50
            'allow_redirects' => [
51 10
                'max' => 3,        // allow at most 10 redirects.
52 10
                'strict' => true,      // use "strict" RFC compliant redirects.
53 10
                'referer' => true,      // add a Referer header
54 10
                'protocols' => ['http', 'https'], // only allow http and https URLs
55
                'track_redirects' => false
56 10
            ],
57 10
            'connect_timeout' => 20,//Use 0 to wait connection indefinitely
58 10
            'timeout' => 30, //Use 0 to wait response indefinitely
59 10
            'debug' => $debug,
60
            //HEADERS
61
            'headers' => [
62
                'Accept' => 'application/json'
63 10
            ],
64
            //UPLOAD FORM FILE
65
            'multipart' => [
66
                [
67 10
                    'name' => 'lock',
68 10
                    'contents' => fopen($fileLock, 'r')
69 10
                ]
70 10
            ]
71 10
        ];
72 10
        $response = null;
73
74
        try {
75 10
            $iResponse = $this->guzzle->request('POST', 'https://security.sensiolabs.org/check_lock', $headers);
76 4
            $responseBody = $iResponse->getBody()->getContents();
77 4
            $response = json_decode($responseBody, true);
78 10
        } catch (\GuzzleHttp\Exception\ClientException $e) {
79 4
            $this->command->error("ClientException!\nMessage: " . $e->getMessage());
80 4
            $colorTag = $this->getColorTagForStatusCode($e->getResponse()->getStatusCode());
81 4
            $this->command->line("HTTP StatusCode: <{$colorTag}>" . $e->getResponse()->getStatusCode() . "<{$colorTag}>");
82 4
            $this->printMessage($e->getResponse());
83 4
            $this->printMessage($e->getRequest());
84 6
        } catch (\GuzzleHttp\Exception\RequestException $e) {
85 4
            $this->command->error("RequestException!\nMessage: " . $e->getMessage());
86 4
            $this->printMessage($e->getRequest());
87 4
            if ($e->hasResponse()) {
88 2
                $colorTag = $this->getColorTagForStatusCode($e->getResponse()->getStatusCode());
89 2
                $this->command->line("HTTP StatusCode: <{$colorTag}>" . $e->getResponse()->getStatusCode() . "<{$colorTag}>");
90 2
                $this->printMessage($e->getResponse());
91 2
            }
92
        }
93 10
        return $response;
94
    }
95
96
    /**
97
     * @param $name
98
     * @param $vulnerability
99
     * @return array
100 4
     */
101
    public function parseVulnerability($name, $vulnerability)
102
    {
103 4
        $data = [
104 4
            'name' => $name,
105 4
            'version' => $vulnerability['version'],
106 4
            'advisories' => array_values($vulnerability['advisories'])
107 4
        ];
108 4
        unset($this->tableVulnerabilities);
109
        foreach ($data['advisories'] as $key2 => $advisory) {
110 4
            $data2 = [
111 4
                'title' => $advisory['title'],
112 4
                'link' => $advisory['link'],
113 4
                'cve' => $advisory['cve']
114
            ];
115
116 4
            $dataTable = [
117 4
                'name' => $data['name'],
118 4
                'version' => $data['version'],
119 4
                'advisories' => $data2["title"]
120
            ];
121 4
122 4
            $this->addVerboseLog($data['name'] . " " . $data['version'] . " " . $data2["title"], true);
123 4
            $this->tableVulnerabilities[] = $dataTable;
124
        }
125 4
126
        return $this->tableVulnerabilities;
127
    }
128
129
    /**
130
     * @param $key
131
     * @param $vulnerability
132 12
     * @param $tuttoOk
133
     * @return array
134 12
     */
135 12
    public function checkResponse($key, $vulnerability, $tuttoOk)
136 10
    {
137 2
        $tableVulnerabilities = array();
138 2
139 8
        foreach ($this->parseVulnerability($key, $vulnerability) as $vul) {
140
            $tableVulnerabilities[] = array_merge($vul, array('isOk' => $tuttoOk));
141 10
        }
142 12
143
        return $tableVulnerabilities;
144
    }
145
146
    /**
147 6
     * @param            $msg
148
     * @param bool|false $error
149 6
     */
150 6
    private function addVerboseLog($msg, $error = false)
151 6
    {
152 6
        $verbose = $this->command->option('verbose');
153 6
        if ($verbose) {
154 6
            if ($error) {
155 6
                $this->command->error($msg);
156 6
            } else {
157 6
                $this->command->line($msg);
158
            }
159 6
        }
160 6
    }
161 6
162 6
    /**
163 6
     * @param \Psr\Http\Message\MessageInterface $message
164 6
     */
165 6
    private function printMessage(\Psr\Http\Message\MessageInterface $message)
166 6
    {
167
        $type = '';
168
        if (is_a($message, '\Psr\Http\Message\RequestInterface')) {
169
            $type = 'REQUEST';
170
        } else if (is_a($message, '\Psr\Http\Message\ResponseInterface')) {
171
            $type = 'RESPONSE';
172
        }
173
        $this->command->info("$type:");
174
        $headers = '';
175
        foreach ($message->getHeaders() as $name => $values) {
176
            $headers .= $name . ': ' . implode(', ', $values) . "\r\n";
177
        }
178 6
        $this->command->comment($headers);
179
        if ($type == 'REQUEST') {
180 6
            $this->command->comment($message->getBody());
181 2
        } else if ($type == 'RESPONSE') {
182
            $this->command->comment($message->getBody()->getContents());
183 4
        }
184
    }
185
186 4
187
    /**
188
     * Get the color tag for the given status code.
189
     *
190
     * @param string $code
191
     *
192
     * @return string
193
     *
194
     * @see https://github.com/spatie/http-status-check/blob/master/src/CrawlLogger.php#L96
195
     */
196
    protected function getColorTagForStatusCode($code)
197
    {
198
        if (starts_with($code, '2')) {
199
            return 'info';
200
        }
201
        if (starts_with($code, '3')) {
202
            return 'comment';
203
        }
204
        return 'error';
205
    }
206
}
207