Moving accounting commands into an Intuit/ namespace, updates to intuit module

This commit is contained in:
Deon George 2024-07-14 13:49:00 +10:00
parent 9580fb1cd9
commit 45fb023d8a
15 changed files with 220 additions and 316 deletions

View File

@ -1,3 +1,4 @@
APP_ADMIN=
APP_DEBUG=false
APP_NAME=OSB
APP_NAME_HTML_LONG="<b>Graytech</b>Hosting"

View File

@ -1,51 +0,0 @@
<?php
namespace App\Console\Commands;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use App\Models\{ProviderOauth,Site,User};
use App\Jobs\AccountingAccountSync as Job;
/**
* Synchronise Customers with Accounts
*/
class AccountingAccountSync extends Command
{
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:account:sync'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}';
/**
* The console command description.
*
* @var string
*/
protected $description = 'Synchronise accounts with accounting system';
/**
* Execute the console command.
*
* @return int
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
Job::dispatchSync($to);
}
}

View File

@ -1,33 +1,32 @@
<?php
namespace App\Console\Commands;
namespace App\Console\Commands\Intuit;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use Intuit\Jobs\AccountingCustomerUpdate;
use Intuit\Models\Customer as AccAccount;
use App\Models\{Account,ProviderOauth,Site,User};
use App\Models\{Account,ProviderOauth,User};
class AccountingAccountAdd extends Command
class AccountAdd extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:account:add'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}'
.' {id : Account ID}';
protected $signature = 'intuit:account:add'
.' {id : Account ID}'
.' {user? : User Email}';
/**
* The console command description.
*
* @var string
*/
protected $description = 'Add an account to the accounting provider';
protected $description = 'Add an account to quickbooks';
/**
* Execute the console command.
@ -36,12 +35,9 @@ class AccountingAccountAdd extends Command
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));

View File

@ -1,33 +1,32 @@
<?php
namespace App\Console\Commands;
namespace App\Console\Commands\Intuit;
use GuzzleHttp\Exception\ConnectException;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use Intuit\Exceptions\ConnectionIssueException;
use App\Models\{ProviderOauth,Site,User};
use App\Models\{ProviderOauth,User};
class AccountingAccountGet extends Command
class AccountGet extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:account:get'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}'
.' {id : Account ID}';
protected $signature = 'intuit:account:get'
.' {id : Account ID}'
.' {user? : User Email}';
/**
* The console command description.
*
* @var string
*/
protected $description = 'Get an account from the accounting provider';
protected $description = 'Get an account from quickbooks';
/**
* Execute the console command.
@ -36,12 +35,9 @@ class AccountingAccountGet extends Command
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
@ -52,7 +48,9 @@ class AccountingAccountGet extends Command
} catch (ConnectException|ConnectionIssueException $e) {
$this->error($e->getMessage());
return Command::FAILURE;
return self::FAILURE;
}
return self::SUCCESS;
}
}

View File

@ -0,0 +1,49 @@
<?php
namespace App\Console\Commands\Intuit;
use Illuminate\Console\Command;
use App\Models\{ProviderOauth,User};
use App\Jobs\AccountingAccountSync as Job;
/**
* Synchronise Customers with Accounts
*/
class AccountSync extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'intuit:account:sync'
.' {user? : User Email}';
/**
* The console command description.
*
* @var string
*/
protected $description = 'Synchronise accounts with quickbooks';
/**
* Execute the console command.
*
* @return int
*/
public function handle()
{
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
Job::dispatchSync($to);
return self::SUCCESS;
}
}

View File

@ -1,26 +1,25 @@
<?php
namespace App\Console\Commands;
namespace App\Console\Commands\Intuit;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use Intuit\Jobs\AccountingInvoiceUpdate;
use Intuit\Models\Invoice as AccInvoice;
use App\Models\{Invoice,ProviderOauth,Site,User};
use App\Models\{Invoice,ProviderOauth,User};
class AccountingInvoiceAdd extends Command
class InvoiceAdd extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:invoice:add'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}'
.' {id : Invoice ID}';
.' {id : Invoice ID}'
.' {user? : User Email}';
/**
* The console command description.
@ -33,15 +32,13 @@ class AccountingInvoiceAdd extends Command
* Execute the console command.
*
* @return int
* @throws \Exception
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
@ -78,12 +75,14 @@ class AccountingInvoiceAdd extends Command
// Some validation
if (! ($ref=$key->product->provider_ref($so))) {
$this->error(sprintf('Accounting not defined in product [%d]',$key->product_id));
exit(1);
return self::FAILURE;
}
if ($key->taxes->count() !== 1) {
$this->error(sprintf('Cannot handle when there is not just 1 tax line [%d]',$key->id));
exit(1);
return self::FAILURE;
}
$c++;

View File

@ -1,33 +1,32 @@
<?php
namespace App\Console\Commands;
namespace App\Console\Commands\Intuit;
use GuzzleHttp\Exception\ConnectException;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use Intuit\Exceptions\ConnectionIssueException;
use App\Models\{ProviderOauth,Site,User};
use App\Models\{ProviderOauth,User};
class AccountingInvoiceGet extends Command
class InvoiceGet extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:invoice:get'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}'
.' {id : Invoice ID}';
protected $signature = 'intuit:invoice:get'
.' {id : Invoice ID}'
.' {user? : User Email}';
/**
* The console command description.
*
* @var string
*/
protected $description = 'Get an invoice from the accounting provider';
protected $description = 'Get an invoice from the quickbooks';
/**
* Execute the console command.
@ -36,12 +35,9 @@ class AccountingInvoiceGet extends Command
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
@ -52,7 +48,9 @@ class AccountingInvoiceGet extends Command
} catch (ConnectException|ConnectionIssueException $e) {
$this->error($e->getMessage());
return Command::FAILURE;
return self::FAILURE;
}
return self::SUCCESS;
}
}

View File

@ -1,25 +1,23 @@
<?php
namespace App\Console\Commands;
namespace App\Console\Commands\Intuit;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use Illuminate\Support\Facades\Log;
use App\Models\{Product, ProviderOauth, Site, User};
use App\Models\{Product,ProviderOauth,User};
use App\Jobs\AccountingItemSync as Job;
class AccountingItemList extends Command
class ItemList extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:item:list'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}';
.' {user? : User Email}';
/**
* The console command description.
@ -35,12 +33,9 @@ class AccountingItemList extends Command
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (($x=$so->tokens->where('user_id',$uo->id))->count() !== 1)
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
@ -67,5 +62,7 @@ class AccountingItemList extends Command
else
$this->info(sprintf('Product [%d](%s) set to accounting [%s]',$po->id,$po->name,$po->accounting));
}
return self::SUCCESS;
}
}

View File

@ -1,27 +1,26 @@
<?php
namespace App\Console\Commands;
namespace App\Console\Commands\Intuit;
use GuzzleHttp\Exception\ConnectException;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use Intuit\Exceptions\ConnectionIssueException;
use App\Jobs\AccountingPaymentSync as Job;
use App\Models\{ProviderOauth,Site,User};
use App\Models\{ProviderOauth,User};
class AccountingPaymentGet extends Command
class PaymentGet extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:payment:get'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}'
.' {id : Payment ID}';
.' {id : Payment ID}'
.' {user? : User Email}';
/**
* The console command description.
@ -37,12 +36,9 @@ class AccountingPaymentGet extends Command
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
@ -59,5 +55,7 @@ class AccountingPaymentGet extends Command
if ($acc)
Job::dispatchSync($to,$acc);
return self::SUCCESS;
}
}

View File

@ -1,24 +1,23 @@
<?php
namespace App\Console\Commands;
namespace App\Console\Commands\Intuit;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use App\Models\{ProviderOauth,Site,User};
use App\Models\{ProviderOauth,User};
use App\Jobs\AccountingPaymentSync as Job;
class AccountingPaymentSync extends Command
class PaymentSync extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:payment:sync'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}';
.' {user? : User Email}';
/**
* The console command description.
@ -34,17 +33,16 @@ class AccountingPaymentSync extends Command
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
$api = $to->API();
foreach ($api->getPayments() as $acc)
Job::dispatchSync($to,$acc);
return self::SUCCESS;
}
}

View File

@ -1,27 +1,26 @@
<?php
namespace App\Console\Commands;
namespace App\Console\Commands\Intuit;
use Illuminate\Console\Command;
use Illuminate\Support\Facades\Config;
use App\Models\{ProviderOauth,Site,User};
use App\Models\{ProviderOauth,User};
use App\Jobs\AccountingTaxSync as Job;
/**
* Synchronise TAX ids with our taxes.
*/
class AccountingTaxSync extends Command
class TaxSync extends Command
{
private const provider = 'intuit';
/**
* The name and signature of the console command.
*
* @var string
*/
protected $signature = 'accounting:tax:sync'
.' {siteid : Site ID}'
.' {provider : Provider Name}'
.' {user : User Email}';
.' {user? : User Email}';
/**
* The console command description.
@ -37,15 +36,14 @@ class AccountingTaxSync extends Command
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$so = ProviderOauth::where('name',self::provider)->singleOrFail();
if (! ($to=$so->token($uo)))
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
Job::dispatchSync($to);
return self::SUCCESS;
}
}

View File

@ -16,9 +16,8 @@ class ProviderTokenRefresh extends Command
* @var string
*/
protected $signature = 'provider:token:refresh'
.' {siteid : Site ID}'
.' {provider : Supplier Name}'
.' {user : User Email}';
.' {user? : User Email}';
/**
* The console command description.
@ -34,15 +33,14 @@ class ProviderTokenRefresh extends Command
*/
public function handle()
{
$site = Site::findOrFail($this->argument('siteid'));
Config::set('site',$site);
$uo = User::where('email',$this->argument('user') ?: config('osb.admin'))->singleOrFail();
$so = ProviderOauth::where('name',$this->argument('provider'))->singleOrFail();
$uo = User::where('email',$this->argument('user'))->singleOrFail();
if (($x=$so->tokens->where('user_id',$uo->id))->count() !== 1)
abort(500,sprintf('Unknown Tokens for [%s]',$uo->email));
Job::dispatchSync($x->pop());
return self::SUCCESS;
}
}

View File

@ -4,11 +4,13 @@ namespace App\Providers;
use Illuminate\Support\Facades\Gate;
use Illuminate\Support\ServiceProvider;
use Intuit\Traits\IntuitSocialite;
use Leenooks\Traits\SingleOrFail;
class AppServiceProvider extends ServiceProvider
{
use SingleOrFail;
use IntuitSocialite;
/**
* Register any application services.
@ -32,5 +34,7 @@ class AppServiceProvider extends ServiceProvider
Gate::define('reseller', function ($user) {
return $user->isReseller();
});
$this->bootIntuitSocialite();
}
}

214
composer.lock generated
View File

@ -338,16 +338,16 @@
},
{
"name": "dflydev/dot-access-data",
"version": "v3.0.2",
"version": "v3.0.3",
"source": {
"type": "git",
"url": "https://github.com/dflydev/dflydev-dot-access-data.git",
"reference": "f41715465d65213d644d3141a6a93081be5d3549"
"reference": "a23a2bf4f31d3518f3ecb38660c95715dfead60f"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/dflydev/dflydev-dot-access-data/zipball/f41715465d65213d644d3141a6a93081be5d3549",
"reference": "f41715465d65213d644d3141a6a93081be5d3549",
"url": "https://api.github.com/repos/dflydev/dflydev-dot-access-data/zipball/a23a2bf4f31d3518f3ecb38660c95715dfead60f",
"reference": "a23a2bf4f31d3518f3ecb38660c95715dfead60f",
"shasum": ""
},
"require": {
@ -407,9 +407,9 @@
],
"support": {
"issues": "https://github.com/dflydev/dflydev-dot-access-data/issues",
"source": "https://github.com/dflydev/dflydev-dot-access-data/tree/v3.0.2"
"source": "https://github.com/dflydev/dflydev-dot-access-data/tree/v3.0.3"
},
"time": "2022-10-27T11:44:00+00:00"
"time": "2024-07-08T12:26:09+00:00"
},
{
"name": "doctrine/inflector",
@ -1534,16 +1534,16 @@
},
{
"name": "laravel/framework",
"version": "v11.14.0",
"version": "v11.15.0",
"source": {
"type": "git",
"url": "https://github.com/laravel/framework.git",
"reference": "657e8464e13147d56bc3a399115c8c26f38d4821"
"reference": "ba85f1c019bed59b3c736c9c4502805efd0ba84b"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/laravel/framework/zipball/657e8464e13147d56bc3a399115c8c26f38d4821",
"reference": "657e8464e13147d56bc3a399115c8c26f38d4821",
"url": "https://api.github.com/repos/laravel/framework/zipball/ba85f1c019bed59b3c736c9c4502805efd0ba84b",
"reference": "ba85f1c019bed59b3c736c9c4502805efd0ba84b",
"shasum": ""
},
"require": {
@ -1649,7 +1649,7 @@
"nyholm/psr7": "^1.2",
"orchestra/testbench-core": "^9.1.5",
"pda/pheanstalk": "^5.0",
"phpstan/phpstan": "^1.4.7",
"phpstan/phpstan": "^1.11.5",
"phpunit/phpunit": "^10.5|^11.0",
"predis/predis": "^2.0.2",
"resend/resend-php": "^0.10.0",
@ -1736,15 +1736,15 @@
"issues": "https://github.com/laravel/framework/issues",
"source": "https://github.com/laravel/framework"
},
"time": "2024-07-02T17:23:58+00:00"
"time": "2024-07-09T15:38:12+00:00"
},
{
"name": "laravel/intuit",
"version": "0.1.8",
"version": "0.1.10",
"source": {
"type": "git",
"url": "https://gitea.dege.au/laravel/intuit.git",
"reference": "c35a439566b60cd845765c497b9d7fd628b13543"
"reference": "947e1358b52270ff36bf87f4b4c60e9e54bf892d"
},
"require": {
"jenssegers/model": "^1.5"
@ -1773,7 +1773,7 @@
"intuit",
"laravel"
],
"time": "2024-07-07T11:25:39+00:00"
"time": "2024-07-14T03:46:04+00:00"
},
{
"name": "laravel/leenooks",
@ -3640,24 +3640,24 @@
},
{
"name": "paragonie/constant_time_encoding",
"version": "v2.7.0",
"version": "v3.0.0",
"source": {
"type": "git",
"url": "https://github.com/paragonie/constant_time_encoding.git",
"reference": "52a0d99e69f56b9ec27ace92ba56897fe6993105"
"reference": "df1e7fde177501eee2037dd159cf04f5f301a512"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/paragonie/constant_time_encoding/zipball/52a0d99e69f56b9ec27ace92ba56897fe6993105",
"reference": "52a0d99e69f56b9ec27ace92ba56897fe6993105",
"url": "https://api.github.com/repos/paragonie/constant_time_encoding/zipball/df1e7fde177501eee2037dd159cf04f5f301a512",
"reference": "df1e7fde177501eee2037dd159cf04f5f301a512",
"shasum": ""
},
"require": {
"php": "^7|^8"
"php": "^8"
},
"require-dev": {
"phpunit/phpunit": "^6|^7|^8|^9",
"vimeo/psalm": "^1|^2|^3|^4"
"phpunit/phpunit": "^9",
"vimeo/psalm": "^4|^5"
},
"type": "library",
"autoload": {
@ -3703,7 +3703,7 @@
"issues": "https://github.com/paragonie/constant_time_encoding/issues",
"source": "https://github.com/paragonie/constant_time_encoding"
},
"time": "2024-05-08T12:18:48+00:00"
"time": "2024-05-08T12:36:18+00:00"
},
{
"name": "paragonie/random_compat",
@ -7596,127 +7596,47 @@
],
"time": "2024-02-05T21:00:39+00:00"
},
{
"name": "web-auth/metadata-service",
"version": "4.8.7",
"source": {
"type": "git",
"url": "https://github.com/web-auth/webauthn-metadata-service.git",
"reference": "64b65c91c0e4e9a299abab3f83f6f4f20c058f0a"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/web-auth/webauthn-metadata-service/zipball/64b65c91c0e4e9a299abab3f83f6f4f20c058f0a",
"reference": "64b65c91c0e4e9a299abab3f83f6f4f20c058f0a",
"shasum": ""
},
"require": {
"ext-json": "*",
"lcobucci/clock": "^2.2|^3.0",
"paragonie/constant_time_encoding": "^2.6",
"php": ">=8.1",
"psr/clock": "^1.0",
"psr/event-dispatcher": "^1.0",
"psr/http-client": "^1.0",
"psr/http-factory": "^1.0",
"psr/log": "^1.0|^2.0|^3.0",
"spomky-labs/pki-framework": "^1.0",
"symfony/deprecation-contracts": "^3.2"
},
"suggest": {
"phpdocumentor/reflection-docblock": "As of 4.5.x, the phpdocumentor/reflection-docblock component will become mandatory for converting objects such as the Metadata Statement",
"psr/clock-implementation": "As of 4.5.x, the PSR Clock implementation will replace lcobucci/clock",
"psr/log-implementation": "Recommended to receive logs from the library",
"symfony/property-access": "As of 4.5.x, the symfony/serializer component will become mandatory for converting objects such as the Metadata Statement",
"symfony/property-info": "As of 4.5.x, the symfony/serializer component will become mandatory for converting objects such as the Metadata Statement",
"symfony/serializer": "As of 4.5.x, the symfony/serializer component will become mandatory for converting objects such as the Metadata Statement",
"web-token/jwt-library": "Mandatory for fetching Metadata Statement from distant sources"
},
"type": "library",
"extra": {
"thanks": {
"name": "web-auth/webauthn-framework",
"url": "https://github.com/web-auth/webauthn-framework"
}
},
"autoload": {
"psr-4": {
"Webauthn\\MetadataService\\": "src/"
}
},
"notification-url": "https://packagist.org/downloads/",
"license": [
"MIT"
],
"authors": [
{
"name": "Florent Morselli",
"homepage": "https://github.com/Spomky"
},
{
"name": "All contributors",
"homepage": "https://github.com/web-auth/metadata-service/contributors"
}
],
"description": "Metadata Service for FIDO2/Webauthn",
"homepage": "https://github.com/web-auth",
"keywords": [
"FIDO2",
"fido",
"webauthn"
],
"support": {
"source": "https://github.com/web-auth/webauthn-metadata-service/tree/4.8.7"
},
"funding": [
{
"url": "https://github.com/Spomky",
"type": "github"
},
{
"url": "https://www.patreon.com/FlorentMorselli",
"type": "patreon"
}
],
"time": "2024-06-15T07:18:26+00:00"
},
{
"name": "web-auth/webauthn-lib",
"version": "4.8.7",
"version": "4.9.0",
"source": {
"type": "git",
"url": "https://github.com/web-auth/webauthn-lib.git",
"reference": "925873eb504a1db8a77dc2b4d2b578334736fa16"
"reference": "0198351b6e823d2e12e2c60732b6dc6e1c39a3fc"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/web-auth/webauthn-lib/zipball/925873eb504a1db8a77dc2b4d2b578334736fa16",
"reference": "925873eb504a1db8a77dc2b4d2b578334736fa16",
"url": "https://api.github.com/repos/web-auth/webauthn-lib/zipball/0198351b6e823d2e12e2c60732b6dc6e1c39a3fc",
"reference": "0198351b6e823d2e12e2c60732b6dc6e1c39a3fc",
"shasum": ""
},
"require": {
"ext-json": "*",
"ext-mbstring": "*",
"ext-openssl": "*",
"paragonie/constant_time_encoding": "^2.6",
"lcobucci/clock": "^2.2|^3.0",
"paragonie/constant_time_encoding": "^2.6|^3.0",
"php": ">=8.1",
"psr/clock": "^1.0",
"psr/event-dispatcher": "^1.0",
"psr/http-client": "^1.0",
"psr/http-factory": "^1.0",
"psr/log": "^1.0|^2.0|^3.0",
"spomky-labs/cbor-php": "^3.0",
"spomky-labs/pki-framework": "^1.0",
"symfony/deprecation-contracts": "^3.2",
"symfony/uid": "^6.1|^7.0",
"web-auth/cose-lib": "^4.2.3",
"web-auth/metadata-service": "self.version"
"web-auth/cose-lib": "^4.2.3"
},
"suggest": {
"phpdocumentor/reflection-docblock": "As of 4.5.x, the phpdocumentor/reflection-docblock component will become mandatory for converting objects such as the Metadata Statement",
"psr/clock-implementation": "As of 4.5.x, the PSR Clock implementation will replace lcobucci/clock",
"psr/log-implementation": "Recommended to receive logs from the library",
"symfony/event-dispatcher": "Recommended to use dispatched events",
"symfony/property-access": "As of 4.5.x, the symfony/serializer component will become mandatory for converting objects such as the Metadata Statement",
"symfony/property-info": "As of 4.5.x, the symfony/serializer component will become mandatory for converting objects such as the Metadata Statement",
"symfony/serializer": "As of 4.5.x, the symfony/serializer component will become mandatory for converting objects such as the Metadata Statement",
"web-token/jwt-library": "Mandatory for the AndroidSafetyNet Attestation Statement support"
"web-token/jwt-library": "Mandatory for fetching Metadata Statement from distant sources"
},
"type": "library",
"extra": {
@ -7752,7 +7672,7 @@
"webauthn"
],
"support": {
"source": "https://github.com/web-auth/webauthn-lib/tree/4.8.7"
"source": "https://github.com/web-auth/webauthn-lib/tree/4.9.0"
},
"funding": [
{
@ -7764,7 +7684,7 @@
"type": "patreon"
}
],
"time": "2024-04-08T10:04:23+00:00"
"time": "2024-07-11T09:06:25+00:00"
},
{
"name": "webmozart/assert",
@ -8904,16 +8824,16 @@
},
{
"name": "phpunit/phpunit",
"version": "11.2.6",
"version": "11.2.7",
"source": {
"type": "git",
"url": "https://github.com/sebastianbergmann/phpunit.git",
"reference": "1dc0fedac703199e8704de085e47dd46bac0dde4"
"reference": "15c7e69dec4a8f246840859e6b430bd2abeb5039"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/sebastianbergmann/phpunit/zipball/1dc0fedac703199e8704de085e47dd46bac0dde4",
"reference": "1dc0fedac703199e8704de085e47dd46bac0dde4",
"url": "https://api.github.com/repos/sebastianbergmann/phpunit/zipball/15c7e69dec4a8f246840859e6b430bd2abeb5039",
"reference": "15c7e69dec4a8f246840859e6b430bd2abeb5039",
"shasum": ""
},
"require": {
@ -8923,25 +8843,25 @@
"ext-mbstring": "*",
"ext-xml": "*",
"ext-xmlwriter": "*",
"myclabs/deep-copy": "^1.10.1",
"phar-io/manifest": "^2.0.3",
"phar-io/version": "^3.0.2",
"myclabs/deep-copy": "^1.12.0",
"phar-io/manifest": "^2.0.4",
"phar-io/version": "^3.2.1",
"php": ">=8.2",
"phpunit/php-code-coverage": "^11.0",
"phpunit/php-file-iterator": "^5.0",
"phpunit/php-invoker": "^5.0",
"phpunit/php-text-template": "^4.0",
"phpunit/php-timer": "^7.0",
"sebastian/cli-parser": "^3.0",
"sebastian/code-unit": "^3.0",
"sebastian/comparator": "^6.0",
"sebastian/diff": "^6.0",
"sebastian/environment": "^7.0",
"sebastian/exporter": "^6.1.2",
"sebastian/global-state": "^7.0",
"sebastian/object-enumerator": "^6.0",
"sebastian/type": "^5.0",
"sebastian/version": "^5.0"
"phpunit/php-code-coverage": "^11.0.5",
"phpunit/php-file-iterator": "^5.0.1",
"phpunit/php-invoker": "^5.0.1",
"phpunit/php-text-template": "^4.0.1",
"phpunit/php-timer": "^7.0.1",
"sebastian/cli-parser": "^3.0.2",
"sebastian/code-unit": "^3.0.1",
"sebastian/comparator": "^6.0.1",
"sebastian/diff": "^6.0.2",
"sebastian/environment": "^7.2.0",
"sebastian/exporter": "^6.1.3",
"sebastian/global-state": "^7.0.2",
"sebastian/object-enumerator": "^6.0.1",
"sebastian/type": "^5.0.1",
"sebastian/version": "^5.0.1"
},
"suggest": {
"ext-soap": "To be able to generate mocks based on WSDL files"
@ -8984,7 +8904,7 @@
"support": {
"issues": "https://github.com/sebastianbergmann/phpunit/issues",
"security": "https://github.com/sebastianbergmann/phpunit/security/policy",
"source": "https://github.com/sebastianbergmann/phpunit/tree/11.2.6"
"source": "https://github.com/sebastianbergmann/phpunit/tree/11.2.7"
},
"funding": [
{
@ -9000,7 +8920,7 @@
"type": "tidelift"
}
],
"time": "2024-07-03T05:51:49+00:00"
"time": "2024-07-10T11:50:09+00:00"
},
{
"name": "sebastian/cli-parser",
@ -9990,16 +9910,16 @@
},
{
"name": "spatie/error-solutions",
"version": "1.0.4",
"version": "1.0.5",
"source": {
"type": "git",
"url": "https://github.com/spatie/error-solutions.git",
"reference": "264a7eef892aceb2fd65e206127ad3af4f3a2d6b"
"reference": "4bb6c734dc992b2db3e26df1ef021c75d2218b13"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/spatie/error-solutions/zipball/264a7eef892aceb2fd65e206127ad3af4f3a2d6b",
"reference": "264a7eef892aceb2fd65e206127ad3af4f3a2d6b",
"url": "https://api.github.com/repos/spatie/error-solutions/zipball/4bb6c734dc992b2db3e26df1ef021c75d2218b13",
"reference": "4bb6c734dc992b2db3e26df1ef021c75d2218b13",
"shasum": ""
},
"require": {
@ -10052,7 +9972,7 @@
],
"support": {
"issues": "https://github.com/spatie/error-solutions/issues",
"source": "https://github.com/spatie/error-solutions/tree/1.0.4"
"source": "https://github.com/spatie/error-solutions/tree/1.0.5"
},
"funding": [
{
@ -10060,7 +9980,7 @@
"type": "github"
}
],
"time": "2024-06-28T13:33:04+00:00"
"time": "2024-07-09T12:13:32+00:00"
},
{
"name": "spatie/flare-client-php",

View File

@ -3,4 +3,5 @@
return [
'language_id' => 1,
'invoice_text' => 'Thank you for using our Internet Services.',
'admin' => env('APP_ADMIN'),
];