2021-09-21 18:21:23 +02:00
|
|
|
package hibp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
// BreachApi is a HIBP breaches API client
|
|
|
|
type BreachApi struct {
|
2021-09-21 19:46:48 +02:00
|
|
|
hibp *Client // References back to the parent HIBP client
|
2021-09-21 18:21:23 +02:00
|
|
|
|
2021-09-21 19:46:48 +02:00
|
|
|
domain string // Filter for a specific breach domain
|
|
|
|
disableTrunc bool // Controls the truncateResponse parameter for the breaches API (defaults to false)
|
|
|
|
noUnverified bool // Controls the includeUnverified parameter for the breaches API (defaults to false)
|
2021-09-21 18:21:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Breach represents a JSON response structure of the breaches API
|
|
|
|
type Breach struct {
|
|
|
|
// Name is a pascal-cased name representing the breach which is unique across all other breaches.
|
|
|
|
// This value never changes and may be used to name dependent assets (such as images) but should not
|
|
|
|
// be shown directly to end users (see the "Title" attribute instead)
|
|
|
|
Name string `json:"Name"`
|
|
|
|
|
|
|
|
// Title is a descriptive title for the breach suitable for displaying to end users. It's unique across
|
|
|
|
// all breaches but individual values may change in the future (i.e. if another breach occurs against
|
|
|
|
// an organisation already in the system). If a stable value is required to reference the breach,
|
|
|
|
// refer to the "Name" attribute instead
|
|
|
|
Title string `json:"Title"`
|
|
|
|
|
|
|
|
// Domain of the primary website the breach occurred on. This may be used for identifying other
|
|
|
|
// assets external systems may have for the site
|
|
|
|
Domain string `json:"Domain"`
|
|
|
|
|
|
|
|
// BreachDate is the date (with no time) the breach originally occurred on in ISO 8601 format. This is not
|
|
|
|
// always accurate — frequently breaches are discovered and reported long after the original incident. Use
|
|
|
|
// this attribute as a guide only
|
|
|
|
BreachDate *ApiDate `json:"BreachDate,omitempty"`
|
|
|
|
|
|
|
|
// AddedDate represents the date and time (precision to the minute) the breach was added to the system
|
|
|
|
// in ISO 8601 format
|
|
|
|
AddedDate time.Time `json:"AddedDate"`
|
|
|
|
|
|
|
|
// ModifiedDate is the date and time (precision to the minute) the breach was modified in ISO 8601 format.
|
|
|
|
// This will only differ from the AddedDate attribute if other attributes represented here are changed or
|
|
|
|
// data in the breach itself is changed (i.e. additional data is identified and loaded). It is always
|
|
|
|
// either equal to or greater then the AddedDate attribute, never less than
|
|
|
|
ModifiedDate time.Time `json:"ModifiedDate"`
|
|
|
|
|
|
|
|
// PwnCount is the total number of accounts loaded into the system. This is usually less than the total
|
|
|
|
// number reported by the media due to duplication or other data integrity issues in the source data
|
|
|
|
PwnCount int `json:"PwnCount"`
|
|
|
|
|
|
|
|
// Description contains an overview of the breach represented in HTML markup. The description may include
|
|
|
|
// markup such as emphasis and strong tags as well as hyperlinks
|
|
|
|
Description string `json:"Description"`
|
|
|
|
|
|
|
|
// DataClasses describes the nature of the data compromised in the breach and contains an alphabetically ordered
|
|
|
|
// string array of impacted data classes
|
|
|
|
DataClasses []string `json:"DataClasses"`
|
2021-09-21 19:46:48 +02:00
|
|
|
|
|
|
|
// IsVerified indicates that the breach is considered unverified. An unverified breach may not have
|
|
|
|
// been hacked from the indicated website. An unverified breach is still loaded into HIBP when there's
|
|
|
|
// sufficient confidence that a significant portion of the data is legitimate
|
|
|
|
IsVerified bool `json:"IsVerified"`
|
|
|
|
|
|
|
|
// IsFabricated indicates that the breach is considered fabricated. A fabricated breach is unlikely
|
|
|
|
// to have been hacked from the indicated website and usually contains a large amount of manufactured
|
|
|
|
// data. However, it still contains legitimate email addresses and asserts that the account owners
|
|
|
|
// were compromised in the alleged breach
|
|
|
|
IsFabricated bool `json:"IsFabricated"`
|
|
|
|
|
|
|
|
// IsSensitive indicates if the breach is considered sensitive. The public API will not return any
|
|
|
|
// accounts for a breach flagged as sensitive
|
|
|
|
IsSensitive bool `json:"IsSensitive"`
|
|
|
|
|
|
|
|
// IsRetired indicates if the breach has been retired. This data has been permanently removed and
|
|
|
|
// will not be returned by the API
|
|
|
|
IsRetired bool `json:"IsRetired"`
|
|
|
|
|
|
|
|
// IsSpamList indicates
|
|
|
|
IsSpamList bool `json:"IsSpamList"`
|
|
|
|
|
|
|
|
// LogoPath represents a URI that specifies where a logo for the breached service can be found.
|
|
|
|
// Logos are always in PNG format
|
|
|
|
LogoPath string `json:"LogoPath"`
|
2021-09-21 18:21:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// BreachOption is an additional option the can be set for the BreachApiClient
|
|
|
|
type BreachOption func(*BreachApi)
|
|
|
|
|
|
|
|
// ApiDate is a date string without time returned by the API represented as time.Time type
|
|
|
|
type ApiDate time.Time
|
|
|
|
|
|
|
|
// Breaches returns a list of all breaches in the HIBP system
|
|
|
|
func (b *BreachApi) Breaches(options ...BreachOption) ([]*Breach, *http.Response, error) {
|
2021-09-22 09:46:18 +02:00
|
|
|
queryParams := b.setBreachOpts(options...)
|
2021-09-21 19:46:48 +02:00
|
|
|
apiUrl := fmt.Sprintf("%s/breaches", BaseUrl)
|
|
|
|
|
2021-09-22 09:46:18 +02:00
|
|
|
hreq, err := b.hibp.HttpReq(http.MethodGet, apiUrl, queryParams)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
2021-09-21 18:21:23 +02:00
|
|
|
}
|
2021-09-22 09:46:18 +02:00
|
|
|
hr, err := b.hibp.hc.Do(hreq)
|
|
|
|
if err != nil {
|
|
|
|
return nil, hr, err
|
|
|
|
}
|
|
|
|
if hr.StatusCode != 200 {
|
|
|
|
return nil, hr, fmt.Errorf("API responded with non HTTP-200: %s", hr.Status)
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
_ = hr.Body.Close()
|
|
|
|
}()
|
2021-09-21 18:21:23 +02:00
|
|
|
|
2021-09-22 09:46:18 +02:00
|
|
|
hb, err := io.ReadAll(hr.Body)
|
|
|
|
if err != nil {
|
|
|
|
return nil, hr, err
|
2021-09-21 19:46:48 +02:00
|
|
|
}
|
|
|
|
|
2021-09-22 09:46:18 +02:00
|
|
|
var breachList []*Breach
|
|
|
|
if err := json.Unmarshal(hb, &breachList); err != nil {
|
|
|
|
return nil, hr, err
|
2021-09-21 19:46:48 +02:00
|
|
|
}
|
|
|
|
|
2021-09-22 09:46:18 +02:00
|
|
|
return breachList, hr, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// BreachByName returns a single breached site based on its name
|
|
|
|
func (b *BreachApi) BreachByName(n string, options ...BreachOption) (*Breach, *http.Response, error) {
|
|
|
|
queryParams := b.setBreachOpts(options...)
|
|
|
|
|
|
|
|
if n == "" {
|
|
|
|
return nil, nil, fmt.Errorf("no breach name given")
|
2021-09-21 18:21:23 +02:00
|
|
|
}
|
|
|
|
|
2021-09-22 09:46:18 +02:00
|
|
|
apiUrl := fmt.Sprintf("%s/breach/%s", BaseUrl, n)
|
|
|
|
|
|
|
|
hreq, err := b.hibp.HttpReq(http.MethodGet, apiUrl, queryParams)
|
2021-09-21 18:21:23 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
hr, err := b.hibp.hc.Do(hreq)
|
|
|
|
if err != nil {
|
|
|
|
return nil, hr, err
|
|
|
|
}
|
|
|
|
if hr.StatusCode != 200 {
|
|
|
|
return nil, hr, fmt.Errorf("API responded with non HTTP-200: %s", hr.Status)
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
_ = hr.Body.Close()
|
|
|
|
}()
|
|
|
|
|
|
|
|
hb, err := io.ReadAll(hr.Body)
|
|
|
|
if err != nil {
|
|
|
|
return nil, hr, err
|
|
|
|
}
|
|
|
|
|
2021-09-22 09:46:18 +02:00
|
|
|
var breachDetails *Breach
|
|
|
|
if err := json.Unmarshal(hb, &breachDetails); err != nil {
|
2021-09-21 18:21:23 +02:00
|
|
|
return nil, hr, err
|
|
|
|
}
|
|
|
|
|
2021-09-22 09:46:18 +02:00
|
|
|
return breachDetails, hr, nil
|
2021-09-21 18:21:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// WithDomain sets the domain filter for the breaches API
|
|
|
|
func WithDomain(d string) BreachOption {
|
|
|
|
return func(b *BreachApi) {
|
|
|
|
b.domain = d
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-21 19:46:48 +02:00
|
|
|
// WithoutTruncate disables the truncateResponse parameter in the breaches API
|
|
|
|
func WithoutTruncate() BreachOption {
|
|
|
|
return func(b *BreachApi) {
|
|
|
|
b.disableTrunc = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-22 09:46:18 +02:00
|
|
|
// WithoutUnverified suppress unverified breaches from the query
|
|
|
|
func WithoutUnverified() BreachOption {
|
|
|
|
return func(b *BreachApi) {
|
|
|
|
b.noUnverified = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-21 18:21:23 +02:00
|
|
|
// UnmarshalJSON for the ApiDate type converts a give date string into a time.Time type
|
|
|
|
func (d *ApiDate) UnmarshalJSON(s []byte) error {
|
|
|
|
ds := string(s)
|
|
|
|
ds = strings.ReplaceAll(ds, `"`, ``)
|
|
|
|
if ds == "null" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
pd, err := time.Parse("2006-01-02", ds)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to convert API date string to time.Time type: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
*(*time.Time)(d) = pd
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Time adds a Time() method to the ApiDate converted time.Time type
|
|
|
|
func (d ApiDate) Time() time.Time {
|
|
|
|
return time.Time(d)
|
|
|
|
}
|
2021-09-22 09:46:18 +02:00
|
|
|
|
|
|
|
// setBreachOpts returns a map of default settings and overridden values from different BreachOption
|
|
|
|
func (b *BreachApi) setBreachOpts(options ...BreachOption) map[string]string {
|
|
|
|
queryParams := map[string]string{
|
|
|
|
"truncateResponse": "true",
|
|
|
|
"includeUnverified": "true",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, opt := range options {
|
|
|
|
opt(b)
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.domain != "" {
|
|
|
|
queryParams["domain"] = b.domain
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.disableTrunc {
|
|
|
|
queryParams["truncateResponse"] = "false"
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.noUnverified {
|
|
|
|
queryParams["includeUnverified"] = "false"
|
|
|
|
}
|
|
|
|
|
|
|
|
return queryParams
|
|
|
|
}
|