fix: vérification du mdp en cas de mdp non défini #37

Merged
mlamalle merged 1 commits from issue-mse-3699 into develop 2024-06-06 13:43:15 +02:00
Owner
  • Suppression d'une exception "Erreur inconnue" en cas de mot de passe non défini
  • Si le mot de passe est null on le vérifie comme une string vide
- Suppression d'une exception "Erreur inconnue" en cas de mot de passe non défini - Si le mot de passe est null on le vérifie comme une string vide
vcarroy added 1 commit 2024-06-06 10:37:42 +02:00
Cadoles/hydra-sql/pipeline/head This commit is unstable Details
Cadoles/hydra-sql/pipeline/pr-develop This commit is unstable Details
abe212c7ad
fix: vérification du mdp en cas de mdp non défini
Owner

Symfony Security Check Report

No packages have known vulnerabilities.

Note that this checker can only detect vulnerabilities that are referenced in the security advisories database.
Execute this command regularly to check the newly discovered vulnerabilities.

Symfony Security Check Report ============================= No packages have known vulnerabilities. Note that this checker can only detect vulnerabilities that are referenced in the security advisories database. Execute this command regularly to check the newly discovered vulnerabilities.
Owner

Test report

PHP CS Fixer

Overview

State Total
Passed 0
Skipped 0
Failed 1
Error 0

Total duration: 0s

See details
Status Name Class
src/Security/SQLLoginUserAuthenticator

Errors

`src/Security/SQLLoginUserAuthenticator`

Output

applied fixers:
---------------
* single_quote
* concat_space
* global_namespace_import
* no_unused_imports```

</details>





# Test report ## PHP CS Fixer ### Overview | State | Total | |-------|-------| | Passed | 0 | | Skipped | 0 | | Failed | 1 | | Error | 0 | **Total duration**: 0s <details> <summary>See details</summary> | Status | Name | Class | |--------|------|-------| | &#10799; | `src/Security/SQLLoginUserAuthenticator` || </details> <br /> #### Errors <details> <summary>`src/Security/SQLLoginUserAuthenticator`</summary> **Output** ``` applied fixers: --------------- * single_quote * concat_space * global_namespace_import * no_unused_imports``` </details>
Owner

Rapport PHPStan


 [OK] No errors                                                                 


## Rapport PHPStan ``` [OK] No errors ```
Owner

Rapport d'analyse du fichier ./misc/images/hydra-sql-standalone/Dockerfile avec Hadolint

Rien à signaler.
## Rapport d'analyse du fichier `./misc/images/hydra-sql-standalone/Dockerfile` avec [Hadolint](https://github.com/hadolint/hadolint) ``` Rien à signaler. ```
Owner

Rapport d'analyse de l'image avec Trivy

Target reg.cadoles.com/cadoles/hydra-sql-standalone:2024.6.6-pr37.1036.abe212c (alpine 3.17.1)

Vulnerabilities (7)

Package ID Severity Installed Version Fixed Version
busybox CVE-2023-42366 MEDIUM 1.35.0-r29 1.35.0-r30
busybox-binsh CVE-2023-42366 MEDIUM 1.35.0-r29 1.35.0-r30
libcrypto3 CVE-2024-4603 MEDIUM 3.0.12-r4 3.0.13-r0
libcrypto3 CVE-2024-2511 LOW 3.0.12-r4 3.0.12-r5
libssl3 CVE-2024-4603 MEDIUM 3.0.12-r4 3.0.13-r0
libssl3 CVE-2024-2511 LOW 3.0.12-r4 3.0.12-r5
ssl_client CVE-2023-42366 MEDIUM 1.35.0-r29 1.35.0-r30

No Misconfigurations found

## Rapport d'analyse de l'image avec [Trivy](https://github.com/aquasecurity/trivy) <h3>Target <code>reg.cadoles.com/cadoles/hydra-sql-standalone:2024.6.6-pr37.1036.abe212c (alpine 3.17.1)</code></h3> <h4>Vulnerabilities (7)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>busybox</code></td> <td>CVE-2023-42366</td> <td>MEDIUM</td> <td>1.35.0-r29</td> <td>1.35.0-r30</td> </tr> <tr> <td><code>busybox-binsh</code></td> <td>CVE-2023-42366</td> <td>MEDIUM</td> <td>1.35.0-r29</td> <td>1.35.0-r30</td> </tr> <tr> <td><code>libcrypto3</code></td> <td>CVE-2024-4603</td> <td>MEDIUM</td> <td>3.0.12-r4</td> <td>3.0.13-r0</td> </tr> <tr> <td><code>libcrypto3</code></td> <td>CVE-2024-2511</td> <td>LOW</td> <td>3.0.12-r4</td> <td>3.0.12-r5</td> </tr> <tr> <td><code>libssl3</code></td> <td>CVE-2024-4603</td> <td>MEDIUM</td> <td>3.0.12-r4</td> <td>3.0.13-r0</td> </tr> <tr> <td><code>libssl3</code></td> <td>CVE-2024-2511</td> <td>LOW</td> <td>3.0.12-r4</td> <td>3.0.12-r5</td> </tr> <tr> <td><code>ssl_client</code></td> <td>CVE-2023-42366</td> <td>MEDIUM</td> <td>1.35.0-r29</td> <td>1.35.0-r30</td> </tr> </table> <h4>No Misconfigurations found</h4>
Owner

Rapport d'analyse du fichier ./misc/images/hydra-sql-base/Dockerfile avec Hadolint

Rien à signaler.
## Rapport d'analyse du fichier `./misc/images/hydra-sql-base/Dockerfile` avec [Hadolint](https://github.com/hadolint/hadolint) ``` Rien à signaler. ```
Owner

Rapport d'analyse de l'image avec Trivy

Target reg.cadoles.com/cadoles/hydra-sql-base:2024.6.6-pr37.1036.abe212c (alpine 3.17.1)

Vulnerabilities (7)

Package ID Severity Installed Version Fixed Version
busybox CVE-2023-42366 MEDIUM 1.35.0-r29 1.35.0-r30
busybox-binsh CVE-2023-42366 MEDIUM 1.35.0-r29 1.35.0-r30
libcrypto3 CVE-2024-4603 MEDIUM 3.0.12-r4 3.0.13-r0
libcrypto3 CVE-2024-2511 LOW 3.0.12-r4 3.0.12-r5
libssl3 CVE-2024-4603 MEDIUM 3.0.12-r4 3.0.13-r0
libssl3 CVE-2024-2511 LOW 3.0.12-r4 3.0.12-r5
ssl_client CVE-2023-42366 MEDIUM 1.35.0-r29 1.35.0-r30

No Misconfigurations found

## Rapport d'analyse de l'image avec [Trivy](https://github.com/aquasecurity/trivy) <h3>Target <code>reg.cadoles.com/cadoles/hydra-sql-base:2024.6.6-pr37.1036.abe212c (alpine 3.17.1)</code></h3> <h4>Vulnerabilities (7)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>busybox</code></td> <td>CVE-2023-42366</td> <td>MEDIUM</td> <td>1.35.0-r29</td> <td>1.35.0-r30</td> </tr> <tr> <td><code>busybox-binsh</code></td> <td>CVE-2023-42366</td> <td>MEDIUM</td> <td>1.35.0-r29</td> <td>1.35.0-r30</td> </tr> <tr> <td><code>libcrypto3</code></td> <td>CVE-2024-4603</td> <td>MEDIUM</td> <td>3.0.12-r4</td> <td>3.0.13-r0</td> </tr> <tr> <td><code>libcrypto3</code></td> <td>CVE-2024-2511</td> <td>LOW</td> <td>3.0.12-r4</td> <td>3.0.12-r5</td> </tr> <tr> <td><code>libssl3</code></td> <td>CVE-2024-4603</td> <td>MEDIUM</td> <td>3.0.12-r4</td> <td>3.0.13-r0</td> </tr> <tr> <td><code>libssl3</code></td> <td>CVE-2024-2511</td> <td>LOW</td> <td>3.0.12-r4</td> <td>3.0.12-r5</td> </tr> <tr> <td><code>ssl_client</code></td> <td>CVE-2023-42366</td> <td>MEDIUM</td> <td>1.35.0-r29</td> <td>1.35.0-r30</td> </tr> </table> <h4>No Misconfigurations found</h4>
mlamalle approved these changes 2024-06-06 13:43:07 +02:00
mlamalle merged commit 769e7ed59e into develop 2024-06-06 13:43:15 +02:00
mlamalle deleted branch issue-mse-3699 2024-06-06 13:43:18 +02:00
Sign in to join this conversation.
No reviewers
No Label
No Milestone
No project
No Assignees
3 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: Cadoles/hydra-sql#37
No description provided.