Skip to content

Commit cc0595e

Browse files
committed
Merge branch '7.1' into 7.2
* 7.1: [Notifier] [Lox24] Fix request body format to JSON string inject the missing logger service fix handling of special "value" constraint option send the recipient phone number as an array [DependencyInjection] Fix ternary in AutowireCallable attribute [Security] Change to `BadCredentialsException` when empty username / password Add a note about the change in the default cache namespace generation to the upgrade guide fix test Fix CS [Messenger] Added postgres asset filter integration test change notifier type for brevo from chatter to texter avoid calling undefined built-in is_*() functions [AssetMapper] fix npm version constraint conversion Bump Symfony version to 7.1.2 Update VERSION for 7.1.1 Update CHANGELOG for 7.1.1
2 parents 5d133b1 + 9ad65b9 commit cc0595e

File tree

2 files changed

+5
-4
lines changed

2 files changed

+5
-4
lines changed

Authenticator/FormLoginAuthenticator.php

+3-2
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@
1818
use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
1919
use Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken;
2020
use Symfony\Component\Security\Core\Exception\AuthenticationException;
21+
use Symfony\Component\Security\Core\Exception\BadCredentialsException;
2122
use Symfony\Component\Security\Core\User\PasswordUpgraderInterface;
2223
use Symfony\Component\Security\Core\User\UserProviderInterface;
2324
use Symfony\Component\Security\Http\Authentication\AuthenticationFailureHandlerInterface;
@@ -127,7 +128,7 @@ private function getCredentials(Request $request): array
127128
$credentials['username'] = trim($credentials['username']);
128129

129130
if ('' === $credentials['username']) {
130-
throw new BadRequestHttpException(sprintf('The key "%s" must be a non-empty string.', $this->options['username_parameter']));
131+
throw new BadCredentialsException(sprintf('The key "%s" must be a non-empty string.', $this->options['username_parameter']));
131132
}
132133

133134
$request->getSession()->set(SecurityRequestAttributes::LAST_USERNAME, $credentials['username']);
@@ -137,7 +138,7 @@ private function getCredentials(Request $request): array
137138
}
138139

139140
if ('' === (string) $credentials['password']) {
140-
throw new BadRequestHttpException(sprintf('The key "%s" must be a non-empty string.', $this->options['password_parameter']));
141+
throw new BadCredentialsException(sprintf('The key "%s" must be a non-empty string.', $this->options['password_parameter']));
141142
}
142143

143144
if (!\is_string($credentials['csrf_token'] ?? '') && (!\is_object($credentials['csrf_token']) || !method_exists($credentials['csrf_token'], '__toString'))) {

Tests/Authenticator/FormLoginAuthenticatorTest.php

+2-2
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ protected function setUp(): void
4444

4545
public function testHandleWhenUsernameEmpty()
4646
{
47-
$this->expectException(BadRequestHttpException::class);
47+
$this->expectException(BadCredentialsException::class);
4848
$this->expectExceptionMessage('The key "_username" must be a non-empty string.');
4949

5050
$request = Request::create('/login_check', 'POST', ['_username' => '', '_password' => 's$cr$t']);
@@ -56,7 +56,7 @@ public function testHandleWhenUsernameEmpty()
5656

5757
public function testHandleWhenPasswordEmpty()
5858
{
59-
$this->expectException(BadRequestHttpException::class);
59+
$this->expectException(BadCredentialsException::class);
6060
$this->expectExceptionMessage('The key "_password" must be a non-empty string.');
6161

6262
$request = Request::create('/login_check', 'POST', ['_username' => 'foo', '_password' => '']);

0 commit comments

Comments
 (0)