FestinHegre/vendor/symfony/validator/Constraints/NotCompromisedPassword.php
2024-09-26 17:26:04 +02:00

55 lines
1.9 KiB
PHP

<?php
/*
* This file is part of the Symfony package.
*
* (c) Fabien Potencier <fabien@symfony.com>
*
* For the full copyright and license information, please view the LICENSE
* file that was distributed with this source code.
*/
namespace Symfony\Component\Validator\Constraints;
use Symfony\Component\Validator\Constraint;
/**
* Checks if a password has been leaked in a data breach.
*
* @author Kévin Dunglas <dunglas@gmail.com>
*/
#[\Attribute(\Attribute::TARGET_PROPERTY | \Attribute::TARGET_METHOD | \Attribute::IS_REPEATABLE)]
class NotCompromisedPassword extends Constraint
{
public const COMPROMISED_PASSWORD_ERROR = 'd9bcdbfe-a9d6-4bfa-a8ff-da5fd93e0f6d';
protected const ERROR_NAMES = [
self::COMPROMISED_PASSWORD_ERROR => 'COMPROMISED_PASSWORD_ERROR',
];
public string $message = 'This password has been leaked in a data breach, it must not be used. Please use another password.';
public int $threshold = 1;
public bool $skipOnError = false;
/**
* @param array<string,mixed>|null $options
* @param int|null $threshold The number of times the password should have been leaked to consider it is compromised (defaults to 1)
* @param bool|null $skipOnError Whether to ignore HTTP errors while requesting the API and thus consider the password valid (defaults to false)
* @param string[]|null $groups
*/
public function __construct(
?array $options = null,
?string $message = null,
?int $threshold = null,
?bool $skipOnError = null,
?array $groups = null,
mixed $payload = null,
) {
parent::__construct($options, $groups, $payload);
$this->message = $message ?? $this->message;
$this->threshold = $threshold ?? $this->threshold;
$this->skipOnError = $skipOnError ?? $this->skipOnError;
}
}