Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Standardise responses for invalid existing passwords #1410

Open
wants to merge 4 commits into
base: master
Choose a base branch
from

Conversation

alxndrsn
Copy link
Contributor

@alxndrsn alxndrsn commented Feb 17, 2025

Closes #1406

What has been done to verify that this works as intended?

Added more test cases.

Why is this the best possible solution? Were any other approaches considered?

Fixing this at the API layer instead of inside util/crypto.js introduces the risk that it may be fixed in one place, but still broken in another.

How does this change affect users? Describe intentional changes to behavior and behavior that could have accidentally been affected by code changes. In other words, what are the regression risks?

Should not affect legitimate use.

Does this change require updates to the API documentation? If so, please update docs/api.yaml as part of this PR.

It should not.

Before submitting this PR, please make sure you have:

  • run make test and confirmed all checks still pass OR confirm CircleCI build passes
  • verified that any code from external sources are properly credited in comments or that everything is internally sourced

@alxndrsn alxndrsn marked this pull request as ready for review February 18, 2025 09:09
@alxndrsn alxndrsn requested a review from sadiqkhoja February 18, 2025 09:11
@alxndrsn alxndrsn changed the title Standardise response codes for different types of wrong password Standardise responses for invalid existing passwords Feb 18, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Server responds 500 on incorrect password data type (existing user)
1 participant