Comptabilite (Super Admin) : - ComptabiliteController avec 7 exports CSV/JSON compatibles SAGE (journal ventes, grand livre, FEC, balance agee, reglements, commissions Stripe 1.5%+0.25E, couts services) - Export PDF via ComptaPdf (FPDF) avec bloc legal pre-rempli, tableau pagine, champ signature DocuSeal - Signature electronique DocuSeal + callback + envoi email signe avec template dedie (compta_export_signed.html.twig) - Rapport financier public (RapportFinancierPdf) : recettes par service, depenses (Stripe, infra, prestataires), bilan excedent/deficit - Codes comptables clients EC-XXXX (plus de 411xxx) Prestataires (Super Admin) : - Entite Prestataire (raisonSociale, siret, email, phone, adresse) - Entite FacturePrestataire (numFacture, montantHt, montantTtc, year, month, isPaid, PDF via Vich) - CRUD complet avec recherche SIRET via proxy API data.gouv.fr - Commande cron app:reminder:factures-prestataire (5 du mois) - Factures prestataires integrees dans export couts services - Sidebar Super Admin : entree Prestataires + Comptabilite Stats (/admin/stats) : - Cout prestataire dynamique depuis FacturePrestataire - Fusion Infra + Prestataire en "Cout de fonctionnement" - Commission Stripe corrigee (1.5% + 0.25E par transaction) Divers : - DocuSealService::sendComptaForSignature() + getApi() - Customer::generateCodeComptable() format EC-XXXX-XXXXX - Protection double prefixe EC- a la creation client - Bouton regenerer PDF cache quand advert state=accepted - Modals sans script inline (data-modal-open/close dans app.js) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
100 lines
3.1 KiB
YAML
100 lines
3.1 KiB
YAML
nelmio_security:
|
|
|
|
clickjacking:
|
|
paths:
|
|
'^/.*': DENY
|
|
|
|
content_type:
|
|
nosniff: true
|
|
|
|
referrer_policy:
|
|
enabled: true
|
|
policies:
|
|
- 'no-referrer'
|
|
- 'strict-origin-when-cross-origin'
|
|
|
|
csp:
|
|
enforce:
|
|
level1_fallback: false
|
|
browser_adaptive:
|
|
enabled: false
|
|
report-uri: '%router.request_context.base_url%/my-csp-report'
|
|
frame-ancestors:
|
|
- 'self'
|
|
frame-src:
|
|
- 'self'
|
|
- 'https://stripe.com'
|
|
- 'https://*.stripe.com'
|
|
- 'https://js.stripe.com'
|
|
- 'https://cloudflare.com'
|
|
- 'https://*.cloudflareinsights.com'
|
|
- 'https://challenges.cloudflare.com'
|
|
script-src:
|
|
- 'self'
|
|
- 'https://static.cloudflareinsights.com'
|
|
- 'https://challenges.cloudflare.com'
|
|
- 'https://cdn.jsdelivr.net'
|
|
- 'https://js.stripe.com'
|
|
- 'unsafe-inline'
|
|
style-src:
|
|
- 'self'
|
|
- 'https://fonts.googleapis.com'
|
|
- 'https://cdnjs.cloudflare.com'
|
|
- 'https://cdn.jsdelivr.net'
|
|
- 'unsafe-inline'
|
|
img-src:
|
|
- 'self'
|
|
- 'data:'
|
|
- 'https://*.tile.openstreetmap.org'
|
|
- 'https://*.basemaps.cartocdn.com'
|
|
- 'https://cdn.jsdelivr.net'
|
|
worker-src:
|
|
- 'self'
|
|
- 'blob:'
|
|
connect-src:
|
|
- 'self'
|
|
- 'https://cloudflareinsights.com'
|
|
- 'https://static.cloudflareinsights.com'
|
|
- 'https://challenges.cloudflare.com'
|
|
- 'https://nominatim.openstreetmap.org'
|
|
- 'https://cdn.jsdelivr.net'
|
|
- 'https://api.stripe.com'
|
|
font-src:
|
|
- 'self'
|
|
- 'https://cdnjs.cloudflare.com'
|
|
- 'https://fonts.googleapis.com'
|
|
- 'https://fonts.gstatic.com'
|
|
object-src:
|
|
- 'none'
|
|
form-action:
|
|
- 'self'
|
|
- 'https://auth.esy-web.dev'
|
|
- 'https://*.stripe.com'
|
|
- 'https://checkout.stripe.com'
|
|
block-all-mixed-content: true
|
|
|
|
permissions_policy:
|
|
enabled: true
|
|
policies:
|
|
payment: ['self']
|
|
camera: ['self']
|
|
microphone: []
|
|
geolocation: ['self']
|
|
|
|
external_redirects:
|
|
override: /external-redirect
|
|
forward_as: redirUrl
|
|
log: true
|
|
allow_list:
|
|
- cloudflareinsights.com
|
|
- static.cloudflareinsights.com
|
|
- stripe.com
|
|
- connect.stripe.com
|
|
- checkout.stripe.com
|
|
- hooks.stripe.com
|
|
- dashboard.stripe.com
|
|
- auth.esy-web.dev
|
|
- challenges.cloudflare.com
|
|
- signature.esy-web.dev
|
|
- signature.e-cosplay.fr
|