Continuous Integration #1962
Annotations
11 warnings
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/cache@v3. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
|
Run mutation tests with pcov and infection/infection:
src/Action/CheckEmailAction.php#L54
Escaped Mutant for Mutator "UnwrapTrim":
@@ @@
public function __invoke(Request $request): Response
{
$username = $request->query->get('username', '');
- if ('' === trim($username)) {
+ if ('' === $username) {
// the user does not come from the sendEmail action
return new RedirectResponse($this->urlGenerator->generate('nucleos_user_admin_resetting_request'));
}
|
Run mutation tests with pcov and infection/infection:
src/Action/CheckEmailAction.php#L63
Escaped Mutant for Mutator "DecrementInteger":
@@ @@
// the user does not come from the sendEmail action
return new RedirectResponse($this->urlGenerator->generate('nucleos_user_admin_resetting_request'));
}
- return new Response($this->twig->render('@NucleosUserAdmin/Admin/Security/Resetting/checkEmail.html.twig', ['base_template' => $this->templateRegistry->getTemplate('layout'), 'admin_pool' => $this->adminPool, 'tokenLifetime' => ceil($this->resetTtl / 3600)]));
+ return new Response($this->twig->render('@NucleosUserAdmin/Admin/Security/Resetting/checkEmail.html.twig', ['base_template' => $this->templateRegistry->getTemplate('layout'), 'admin_pool' => $this->adminPool, 'tokenLifetime' => ceil($this->resetTtl / 3599)]));
}
}
|
Run mutation tests with pcov and infection/infection:
src/Action/CheckEmailAction.php#L63
Escaped Mutant for Mutator "IncrementInteger":
@@ @@
// the user does not come from the sendEmail action
return new RedirectResponse($this->urlGenerator->generate('nucleos_user_admin_resetting_request'));
}
- return new Response($this->twig->render('@NucleosUserAdmin/Admin/Security/Resetting/checkEmail.html.twig', ['base_template' => $this->templateRegistry->getTemplate('layout'), 'admin_pool' => $this->adminPool, 'tokenLifetime' => ceil($this->resetTtl / 3600)]));
+ return new Response($this->twig->render('@NucleosUserAdmin/Admin/Security/Resetting/checkEmail.html.twig', ['base_template' => $this->templateRegistry->getTemplate('layout'), 'admin_pool' => $this->adminPool, 'tokenLifetime' => ceil($this->resetTtl / 3601)]));
}
}
|
Run mutation tests with pcov and infection/infection:
src/Action/LoginAction.php#L109
Escaped Mutant for Mutator "MethodCallRemoval":
@@ @@
return new RedirectResponse($this->router->generate('sonata_admin_dashboard'));
}
$event = new GetResponseLoginEvent($request);
- $this->eventDispatcher->dispatch($event, NucleosUserEvents::SECURITY_LOGIN_INITIALIZE);
+
if (null !== $event->getResponse()) {
return $event->getResponse();
}
|
Run mutation tests with pcov and infection/infection:
src/Action/LoginAction.php#L127
Escaped Mutant for Mutator "ArrayItemRemoval":
@@ @@
$url = ('' !== $refererUri && $refererUri !== $request->getUri()) ? $refererUri : $this->router->generate('sonata_admin_dashboard');
return new RedirectResponse($url);
}
- $form = $this->formFactory->create(LoginFormType::class, null, ['action' => $this->router->generate('nucleos_user_admin_security_check'), 'method' => 'POST'])->add('save', SubmitType::class, ['label' => 'security.login.submit']);
+ $form = $this->formFactory->create(LoginFormType::class, null, ['action' => $this->router->generate('nucleos_user_admin_security_check'), 'method' => 'POST'])->add('save', SubmitType::class, []);
// last username entered by the user
return new Response($this->twig->render('@NucleosUserAdmin/Admin/Security/login.html.twig', ['form' => $form->createView(), 'admin_pool' => $this->adminPool, 'base_template' => $this->templateRegistry->getTemplate('layout'), 'csrf_token' => $this->getCsrfToken(), 'error' => $this->getLastAuthenticationError($request), 'last_username' => $this->getLastUsername($session), 'reset_route' => $this->router->generate('nucleos_user_admin_resetting_request')]));
}
|
Run mutation tests with pcov and infection/infection:
src/Action/LoginAction.php#L165
Escaped Mutant for Mutator "LogicalAnd":
@@ @@
// get the error if any (works with forward and redirect -- see below)
if ($request->attributes->has($authErrorKey)) {
$error = $request->attributes->get($authErrorKey);
- } elseif (null !== $session && $session->has($authErrorKey)) {
+ } elseif (null !== $session || $session->has($authErrorKey)) {
$error = $session->get($authErrorKey);
$session->remove($authErrorKey);
} else {
|
Run mutation tests with pcov and infection/infection:
src/Action/LoginAction.php#L167
Escaped Mutant for Mutator "MethodCallRemoval":
@@ @@
$error = $request->attributes->get($authErrorKey);
} elseif (null !== $session && $session->has($authErrorKey)) {
$error = $session->get($authErrorKey);
- $session->remove($authErrorKey);
+
} else {
$error = null;
}
|
Run mutation tests with pcov and infection/infection:
src/Action/LoginAction.php#L172
Escaped Mutant for Mutator "InstanceOf_":
@@ @@
} else {
$error = null;
}
- if (!$error instanceof AuthenticationException) {
+ if (!true) {
$error = null;
// The value does not come from the security component.
}
|
Run mutation tests with pcov and infection/infection:
src/Action/LoginAction.php#L198
Escaped Mutant for Mutator "InstanceOf_":
@@ @@
return false;
}
$user = $token->getUser();
- return $user instanceof UserInterface;
+ return true;
}
private function getCsrfToken(): ?string
{
|
Run mutation tests with pcov and infection/infection:
src/Action/LoginAction.php#L208
Escaped Mutant for Mutator "InstanceOf_":
@@ @@
}
private function addFlash(?SessionInterface $session, string $type, string $message): void
{
- if (!$session instanceof Session) {
+ if (!true) {
return;
}
$session->getFlashBag()->add($type, $message);
}
}
|
Loading