Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Feature/user edit form #165

Merged
merged 10 commits into from
Feb 16, 2023
Merged

Feature/user edit form #165

merged 10 commits into from
Feb 16, 2023

Conversation

igorgoncalves
Copy link
Member

No description provided.

ruancelisantos and others added 10 commits October 25, 2022 09:29
* Add attribute Label for civil_name

* Add input for social name

* Add migration com os comandos sql para o nome social do professor

* Adicionado nova tag versão e as modificações na BOARD_MSG

* Add título para o tooltip do nome social e civil

* Add variableData par Civil Name e Social Name

* Add property para Nova coluna na tabela 'instructor_identification':

* add ao help os títulos do professor

* Format InstructorIdentification
@igorgoncalves igorgoncalves temporarily deployed to QA February 16, 2023 00:26 — with GitHub Actions Inactive
@igorgoncalves igorgoncalves temporarily deployed to QA February 16, 2023 00:26 — with GitHub Actions Inactive
@igorgoncalves igorgoncalves temporarily deployed to QA February 16, 2023 00:26 — with GitHub Actions Inactive
@igorgoncalves igorgoncalves temporarily deployed to QA February 16, 2023 00:26 — with GitHub Actions Inactive
if (isset($_POST['Users'], $_POST['Confirm'])) {
$model->attributes = $_POST['Users'];
if ($model->validate()) {
$password = md5($_POST['Users']['password']);

Check warning

Code scanning / SnykCode

Use of Password Hash With Insufficient Computational Effort

MD5 hash (used in md5) is insecure. Consider changing it to a secure hashing algorithm.
$model->attributes = $_POST['Users'];
if ($model->validate()) {
$password = md5($_POST['Users']['password']);
$confirm = md5($_POST['Confirm']);

Check warning

Code scanning / SnykCode

Use of Password Hash With Insufficient Computational Effort

MD5 hash (used in md5) is insecure. Consider changing it to a secure hashing algorithm.
$model = Users::model()->findByPk($id);

if (isset($_POST['Users'], $_POST['Confirm'])) {
$password = md5($_POST['Users']['password']);

Check warning

Code scanning / SnykCode

Use of Password Hash With Insufficient Computational Effort

MD5 hash (used in md5) is insecure. Consider changing it to a secure hashing algorithm.

if (isset($_POST['Users'], $_POST['Confirm'])) {
$password = md5($_POST['Users']['password']);
$confirm = md5($_POST['Confirm']);

Check warning

Code scanning / SnykCode

Use of Password Hash With Insufficient Computational Effort

MD5 hash (used in md5) is insecure. Consider changing it to a secure hashing algorithm.
if (isset($_POST['Users'], $_POST['Confirm'])) {
$model->attributes = $_POST['Users'];
if ($model->validate()) {
$password = md5($_POST['Users']['password']);

Check warning

Code scanning / SnykCode

Use of Password Hash With Insufficient Computational Effort

MD5 hash (used in md5) is insecure. Consider changing it to a secure hashing algorithm.
$model->attributes = $_POST['Users'];
if ($model->validate()) {
$password = md5($_POST['Users']['password']);
$confirm = md5($_POST['Confirm']);

Check warning

Code scanning / SnykCode

Use of Password Hash With Insufficient Computational Effort

MD5 hash (used in md5) is insecure. Consider changing it to a secure hashing algorithm.
@sonarqubecloud
Copy link

SonarCloud Quality Gate failed.    Quality Gate failed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot E 2 Security Hotspots
Code Smell A 36 Code Smells

0.0% 0.0% Coverage
24.9% 24.9% Duplication

@igorgoncalves igorgoncalves merged commit be60ed6 into dev Feb 16, 2023
@igorgoncalves igorgoncalves deleted the feature/user-edit-form branch December 6, 2023 22:04
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants