revert recherche lowercase dans la requête de connexion #49

Open
vcarroy wants to merge 1 commits from issue-mse-4332 into develop
Owner

Revert PR #48

Revert PR #48
vcarroy added 1 commit 2024-12-03 16:03:44 +01:00
revert recherche lowercase dans la requête de connexion
Some checks reported warnings
Cadoles/hydra-sql/pipeline/head Build started...
Cadoles/hydra-sql/pipeline/pr-develop This commit is unstable
fb0ee192ae
Owner

Symfony Security Check Report

5 packages have known vulnerabilities.

symfony/http-client (v5.4.44)

  • CVE-2024-50342: Internal address and port enumeration allowed by NoPrivateNetworkHttpClient

symfony/http-foundation (v5.4.44)

symfony/runtime (v5.4.40)

symfony/security-http (v5.4.44)

  • CVE-2024-51996: Authentication Bypass via persisted RememberMe cookie

twig/twig (v3.14.0)

  • CVE-2024-51754: Unguarded calls to __toString() when nesting an object into an array
  • CVE-2024-51755: Unguarded calls to __isset() and to array-accesses when the sandbox is enabled

Note that this checker can only detect vulnerabilities that are referenced in the security advisories database.
Execute this command regularly to check the newly discovered vulnerabilities.

Symfony Security Check Report ============================= 5 packages have known vulnerabilities. symfony/http-client (v5.4.44) ----------------------------- * [CVE-2024-50342][]: Internal address and port enumeration allowed by NoPrivateNetworkHttpClient symfony/http-foundation (v5.4.44) --------------------------------- * [CVE-2024-50345][]: Open redirect via browser-sanitized URLs symfony/runtime (v5.4.40) ------------------------- * [CVE-2024-50340][]: Ability to change environment from query symfony/security-http (v5.4.44) ------------------------------- * [CVE-2024-51996][]: Authentication Bypass via persisted RememberMe cookie twig/twig (v3.14.0) ------------------- * [CVE-2024-51754][]: Unguarded calls to __toString() when nesting an object into an array * [CVE-2024-51755][]: Unguarded calls to __isset() and to array-accesses when the sandbox is enabled [CVE-2024-50342]: https://symfony.com/cve-2024-50342 [CVE-2024-50345]: https://symfony.com/cve-2024-50345 [CVE-2024-50340]: https://symfony.com/cve-2024-50340 [CVE-2024-51996]: https://symfony.com/cve-2024-51996 [CVE-2024-51754]: https://symfony.com/blog/unguarded-calls-to-__tostring-when-nesting-an-object-into-an-array [CVE-2024-51755]: https://symfony.com/blog/unguarded-calls-to-__isset-and-to-array-accesses-when-the-sandbox-is-enabled Note that this checker can only detect vulnerabilities that are referenced in the security advisories database. Execute this command regularly to check the newly discovered vulnerabilities.
Owner

Test report

PHP CS Fixer

Overview

State Total
Passed 1
Skipped 0
Failed 0
Error 0

Total duration: 0s

See details
Status Name Class
All OK

# Test report ## PHP CS Fixer ### Overview | State | Total | |-------|-------| | Passed | 1 | | Skipped | 0 | | Failed | 0 | | Error | 0 | **Total duration**: 0s <details> <summary>See details</summary> | Status | Name | Class | |--------|------|-------| | &#10003; | `All OK` || </details> <br />
Owner

Rapport PHPStan


 [OK] No errors                                                                 


## Rapport PHPStan ``` [OK] No errors ```
Owner

Symfony Security Check Report

5 packages have known vulnerabilities.

symfony/http-client (v5.4.44)

  • CVE-2024-50342: Internal address and port enumeration allowed by NoPrivateNetworkHttpClient

symfony/http-foundation (v5.4.44)

symfony/runtime (v5.4.40)

symfony/security-http (v5.4.44)

  • CVE-2024-51996: Authentication Bypass via persisted RememberMe cookie

twig/twig (v3.14.0)

  • CVE-2024-51754: Unguarded calls to __toString() when nesting an object into an array
  • CVE-2024-51755: Unguarded calls to __isset() and to array-accesses when the sandbox is enabled

Note that this checker can only detect vulnerabilities that are referenced in the security advisories database.
Execute this command regularly to check the newly discovered vulnerabilities.

Symfony Security Check Report ============================= 5 packages have known vulnerabilities. symfony/http-client (v5.4.44) ----------------------------- * [CVE-2024-50342][]: Internal address and port enumeration allowed by NoPrivateNetworkHttpClient symfony/http-foundation (v5.4.44) --------------------------------- * [CVE-2024-50345][]: Open redirect via browser-sanitized URLs symfony/runtime (v5.4.40) ------------------------- * [CVE-2024-50340][]: Ability to change environment from query symfony/security-http (v5.4.44) ------------------------------- * [CVE-2024-51996][]: Authentication Bypass via persisted RememberMe cookie twig/twig (v3.14.0) ------------------- * [CVE-2024-51754][]: Unguarded calls to __toString() when nesting an object into an array * [CVE-2024-51755][]: Unguarded calls to __isset() and to array-accesses when the sandbox is enabled [CVE-2024-50342]: https://symfony.com/cve-2024-50342 [CVE-2024-50345]: https://symfony.com/cve-2024-50345 [CVE-2024-50340]: https://symfony.com/cve-2024-50340 [CVE-2024-51996]: https://symfony.com/cve-2024-51996 [CVE-2024-51754]: https://symfony.com/blog/unguarded-calls-to-__tostring-when-nesting-an-object-into-an-array [CVE-2024-51755]: https://symfony.com/blog/unguarded-calls-to-__isset-and-to-array-accesses-when-the-sandbox-is-enabled Note that this checker can only detect vulnerabilities that are referenced in the security advisories database. Execute this command regularly to check the newly discovered vulnerabilities.
Owner

Test report

PHP CS Fixer

Overview

State Total
Passed 0
Skipped 0
Failed 1
Error 0

Total duration: 0s

See details
Status Name Class
src/Service/SQLLoginService

Errors

`src/Service/SQLLoginService`

Output

applied fixers:
---------------
* global_namespace_import
* trailing_comma_in_multiline
* no_unused_imports```

</details>





# Test report ## PHP CS Fixer ### Overview | State | Total | |-------|-------| | Passed | 0 | | Skipped | 0 | | Failed | 1 | | Error | 0 | **Total duration**: 0s <details> <summary>See details</summary> | Status | Name | Class | |--------|------|-------| | &#10799; | `src/Service/SQLLoginService` || </details> <br /> #### Errors <details> <summary>`src/Service/SQLLoginService`</summary> **Output** ``` applied fixers: --------------- * global_namespace_import * trailing_comma_in_multiline * no_unused_imports``` </details>
Owner

Rapport PHPStan


 [OK] No errors                                                                 


## Rapport PHPStan ``` [OK] No errors ```
Owner

Symfony Security Check Report

No packages have known vulnerabilities.

Note that this checker can only detect vulnerabilities that are referenced in the security advisories database.
Execute this command regularly to check the newly discovered vulnerabilities.

Symfony Security Check Report ============================= No packages have known vulnerabilities. Note that this checker can only detect vulnerabilities that are referenced in the security advisories database. Execute this command regularly to check the newly discovered vulnerabilities.
Owner

Test report

PHP CS Fixer

Overview

State Total
Passed 0
Skipped 0
Failed 8
Error 0

Total duration: 0s

See details
Status Name Class
src/Form/LoginType
src/Altcha/AltchaTransformer
src/Altcha/Form/AltchaType
src/Altcha/Form/AltchaModel
src/Altcha/AltchaValidator
src/Flag/FlagAccessor
src/Service/SQLLoginService
src/Hydra/Client

Errors

`src/Form/LoginType`

Output

applied fixers:
---------------
* trailing_comma_in_multiline```

</details>


<details>
  <summary>`src/Altcha/AltchaTransformer`</summary>

**Output** 

applied fixers:

  • no_superfluous_phpdoc_tags
  • no_empty_phpdoc```
`src/Altcha/Form/AltchaType`

Output

applied fixers:
---------------
* trailing_comma_in_multiline```

</details>


<details>
  <summary>`src/Altcha/Form/AltchaModel`</summary>

**Output** 

applied fixers:

  • phpdoc_separation```
`src/Altcha/AltchaValidator`

Output

applied fixers:
---------------
* trailing_comma_in_multiline```

</details>


<details>
  <summary>`src/Flag/FlagAccessor`</summary>

**Output** 

applied fixers:

  • trailing_comma_in_multiline```
`src/Service/SQLLoginService`

Output

applied fixers:
---------------
* global_namespace_import
* trailing_comma_in_multiline
* no_unused_imports```

</details>


<details>
  <summary>`src/Hydra/Client`</summary>

**Output** 

applied fixers:

  • trailing_comma_in_multiline```
# Test report ## PHP CS Fixer ### Overview | State | Total | |-------|-------| | Passed | 0 | | Skipped | 0 | | Failed | 8 | | Error | 0 | **Total duration**: 0s <details> <summary>See details</summary> | Status | Name | Class | |--------|------|-------| | &#10799; | `src/Form/LoginType` || | &#10799; | `src/Altcha/AltchaTransformer` || | &#10799; | `src/Altcha/Form/AltchaType` || | &#10799; | `src/Altcha/Form/AltchaModel` || | &#10799; | `src/Altcha/AltchaValidator` || | &#10799; | `src/Flag/FlagAccessor` || | &#10799; | `src/Service/SQLLoginService` || | &#10799; | `src/Hydra/Client` || </details> <br /> #### Errors <details> <summary>`src/Form/LoginType`</summary> **Output** ``` applied fixers: --------------- * trailing_comma_in_multiline``` </details> <details> <summary>`src/Altcha/AltchaTransformer`</summary> **Output** ``` applied fixers: --------------- * no_superfluous_phpdoc_tags * no_empty_phpdoc``` </details> <details> <summary>`src/Altcha/Form/AltchaType`</summary> **Output** ``` applied fixers: --------------- * trailing_comma_in_multiline``` </details> <details> <summary>`src/Altcha/Form/AltchaModel`</summary> **Output** ``` applied fixers: --------------- * phpdoc_separation``` </details> <details> <summary>`src/Altcha/AltchaValidator`</summary> **Output** ``` applied fixers: --------------- * trailing_comma_in_multiline``` </details> <details> <summary>`src/Flag/FlagAccessor`</summary> **Output** ``` applied fixers: --------------- * trailing_comma_in_multiline``` </details> <details> <summary>`src/Service/SQLLoginService`</summary> **Output** ``` applied fixers: --------------- * global_namespace_import * trailing_comma_in_multiline * no_unused_imports``` </details> <details> <summary>`src/Hydra/Client`</summary> **Output** ``` applied fixers: --------------- * trailing_comma_in_multiline``` </details>
Owner

Rapport PHPStan


 [OK] No errors                                                                 


## Rapport PHPStan ``` [OK] No errors ```
Owner

Rapport d'analyse du fichier ./misc/images/hydra-sql-standalone/Dockerfile avec Hadolint

Rien à signaler.
## Rapport d'analyse du fichier `./misc/images/hydra-sql-standalone/Dockerfile` avec [Hadolint](https://github.com/hadolint/hadolint) ``` Rien à signaler. ```
Owner

Rapport d'analyse de l'image avec Trivy

Target reg.cadoles.com/cadoles/hydra-sql-standalone:2025.4.11-pr49.1211.dd5aa8c (alpine 3.17.1)

Vulnerabilities (4)

Package ID Severity Installed Version Fixed Version
libcrypto3 CVE-2024-9143 LOW 3.0.15-r0 3.0.15-r1
libexpat CVE-2024-50602 MEDIUM 2.6.3-r0 2.6.4-r0
libssl3 CVE-2024-9143 LOW 3.0.15-r0 3.0.15-r1
musl-utils CVE-2025-26519 UNKNOWN 1.2.3-r5 1.2.3-r6

No Misconfigurations found

Target Node.js

Vulnerabilities (1)

Package ID Severity Installed Version Fixed Version
cross-spawn CVE-2024-21538 HIGH 7.0.3 7.0.5, 6.0.6

No Misconfigurations found

## Rapport d'analyse de l'image avec [Trivy](https://github.com/aquasecurity/trivy) <h3>Target <code>reg.cadoles.com/cadoles/hydra-sql-standalone:2025.4.11-pr49.1211.dd5aa8c (alpine 3.17.1)</code></h3> <h4>Vulnerabilities (4)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>libcrypto3</code></td> <td>CVE-2024-9143</td> <td>LOW</td> <td>3.0.15-r0</td> <td>3.0.15-r1</td> </tr> <tr> <td><code>libexpat</code></td> <td>CVE-2024-50602</td> <td>MEDIUM</td> <td>2.6.3-r0</td> <td>2.6.4-r0</td> </tr> <tr> <td><code>libssl3</code></td> <td>CVE-2024-9143</td> <td>LOW</td> <td>3.0.15-r0</td> <td>3.0.15-r1</td> </tr> <tr> <td><code>musl-utils</code></td> <td>CVE-2025-26519</td> <td>UNKNOWN</td> <td>1.2.3-r5</td> <td>1.2.3-r6</td> </tr> </table> <h4>No Misconfigurations found</h4> <h3>Target <code>Node.js</code></h3> <h4>Vulnerabilities (1)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>cross-spawn</code></td> <td>CVE-2024-21538</td> <td>HIGH</td> <td>7.0.3</td> <td>7.0.5, 6.0.6</td> </tr> </table> <h4>No Misconfigurations found</h4>
Owner

Rapport d'analyse du fichier ./misc/images/hydra-sql-base/Dockerfile avec Hadolint

Rien à signaler.
## Rapport d'analyse du fichier `./misc/images/hydra-sql-base/Dockerfile` avec [Hadolint](https://github.com/hadolint/hadolint) ``` Rien à signaler. ```
Owner

Rapport d'analyse de l'image avec Trivy

Target reg.cadoles.com/cadoles/hydra-sql-base:2025.4.11-pr49.1211.dd5aa8c (alpine 3.17.1)

Vulnerabilities (4)

Package ID Severity Installed Version Fixed Version
libcrypto3 CVE-2024-9143 LOW 3.0.15-r0 3.0.15-r1
libexpat CVE-2024-50602 MEDIUM 2.6.3-r0 2.6.4-r0
libssl3 CVE-2024-9143 LOW 3.0.15-r0 3.0.15-r1
musl-utils CVE-2025-26519 UNKNOWN 1.2.3-r5 1.2.3-r6

No Misconfigurations found

Target Node.js

Vulnerabilities (1)

Package ID Severity Installed Version Fixed Version
cross-spawn CVE-2024-21538 HIGH 7.0.3 7.0.5, 6.0.6

No Misconfigurations found

## Rapport d'analyse de l'image avec [Trivy](https://github.com/aquasecurity/trivy) <h3>Target <code>reg.cadoles.com/cadoles/hydra-sql-base:2025.4.11-pr49.1211.dd5aa8c (alpine 3.17.1)</code></h3> <h4>Vulnerabilities (4)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>libcrypto3</code></td> <td>CVE-2024-9143</td> <td>LOW</td> <td>3.0.15-r0</td> <td>3.0.15-r1</td> </tr> <tr> <td><code>libexpat</code></td> <td>CVE-2024-50602</td> <td>MEDIUM</td> <td>2.6.3-r0</td> <td>2.6.4-r0</td> </tr> <tr> <td><code>libssl3</code></td> <td>CVE-2024-9143</td> <td>LOW</td> <td>3.0.15-r0</td> <td>3.0.15-r1</td> </tr> <tr> <td><code>musl-utils</code></td> <td>CVE-2025-26519</td> <td>UNKNOWN</td> <td>1.2.3-r5</td> <td>1.2.3-r6</td> </tr> </table> <h4>No Misconfigurations found</h4> <h3>Target <code>Node.js</code></h3> <h4>Vulnerabilities (1)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>cross-spawn</code></td> <td>CVE-2024-21538</td> <td>HIGH</td> <td>7.0.3</td> <td>7.0.5, 6.0.6</td> </tr> </table> <h4>No Misconfigurations found</h4>
Some checks reported warnings
Cadoles/hydra-sql/pipeline/head Build started...
Cadoles/hydra-sql/pipeline/pr-develop This commit is unstable
This pull request can be merged automatically.
This branch is out-of-date with the base branch
The changes on this branch are already on the target branch. This will be an empty commit.
You are not authorized to merge this pull request.

Checkout

From your project repository, check out a new branch and test the changes.
git fetch -u origin issue-mse-4332:issue-mse-4332
git checkout issue-mse-4332
Sign in to join this conversation.
No Reviewers
No Label
2 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: Cadoles/hydra-sql#49
No description provided.