On 11/14/19 11:00 AM, Fabian Grünbichler wrote:
> the parameter needs to be a hash reference, not a hash.
> 
> Signed-off-by: Fabian Grünbichler <f.gruenbich...@proxmox.com>
> ---
> 
> Notes:
>     checked other code, seems like this was the only instance of mis-use.
> 
>  PVE/API2/AccessControl.pm | 6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/PVE/API2/AccessControl.pm b/PVE/API2/AccessControl.pm
> index c2324e8..b3fbe6d 100644
> --- a/PVE/API2/AccessControl.pm
> +++ b/PVE/API2/AccessControl.pm
> @@ -6,7 +6,7 @@ use warnings;
>  use JSON;
>  use MIME::Base64;
>  
> -use PVE::Exception qw(raise raise_perm_exc);
> +use PVE::Exception qw(raise raise_perm_exc raise_param_exc);
>  use PVE::SafeSyslog;
>  use PVE::RPCEnvironment;
>  use PVE::Cluster qw(cfs_read_file);
> @@ -532,7 +532,7 @@ __PACKAGE__->register_method ({
>  
>       # Regular users need to confirm their password to change u2f settings.
>       if ($authuser ne 'root@pam') {
> -         raise_param_exc('password' => 'password is required to modify u2f 
> data')
> +         raise_param_exc({ 'password' => 'password is required to modify u2f 
> data' })
>               if !defined($password);
>           my $domain_cfg = cfs_read_file('domains.cfg');
>           my $cfg = $domain_cfg->{ids}->{$realm};
> @@ -564,7 +564,7 @@ __PACKAGE__->register_method ({
>               return $challenge;
>           }
>       } elsif ($action eq 'confirm') {
> -         raise_param_exc('response' => "confirm action requires the 
> 'response' parameter to be set")
> +         raise_param_exc({ 'response' => "confirm action requires the 
> 'response' parameter to be set" })
>               if !defined($response);
>  
>           my ($type, $u2fdata) = PVE::AccessControl::user_get_tfa($userid, 
> $realm);
> 

applied, thanks!


_______________________________________________
pve-devel mailing list
pve-devel@pve.proxmox.com
https://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to