* * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Symfony\Component\Validator\Constraints; use Symfony\Component\Validator\Constraint; /** * Checks if a password has been leaked in a data breach. * * @author Kévin Dunglas */ #[\Attribute(\Attribute::TARGET_PROPERTY | \Attribute::TARGET_METHOD | \Attribute::IS_REPEATABLE)] class NotCompromisedPassword extends Constraint { public const COMPROMISED_PASSWORD_ERROR = 'd9bcdbfe-a9d6-4bfa-a8ff-da5fd93e0f6d'; protected const ERROR_NAMES = [ self::COMPROMISED_PASSWORD_ERROR => 'COMPROMISED_PASSWORD_ERROR', ]; public string $message = 'This password has been leaked in a data breach, it must not be used. Please use another password.'; public int $threshold = 1; public bool $skipOnError = false; /** * @param array|null $options * @param int|null $threshold The number of times the password should have been leaked to consider it is compromised (defaults to 1) * @param bool|null $skipOnError Whether to ignore HTTP errors while requesting the API and thus consider the password valid (defaults to false) * @param string[]|null $groups */ public function __construct( ?array $options = null, ?string $message = null, ?int $threshold = null, ?bool $skipOnError = null, ?array $groups = null, mixed $payload = null, ) { parent::__construct($options, $groups, $payload); $this->message = $message ?? $this->message; $this->threshold = $threshold ?? $this->threshold; $this->skipOnError = $skipOnError ?? $this->skipOnError; } }