From e240695bd9040cba80645a30535bac4424d53f5d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabian=20Gr=C3=BCnbichler?= Date: Thu, 14 Nov 2019 11:00:59 +0100 Subject: [PATCH] API: fix calls to raise_param_exc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit the parameter needs to be a hash reference, not a hash. Signed-off-by: Fabian Grünbichler --- PVE/API2/AccessControl.pm | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/PVE/API2/AccessControl.pm b/PVE/API2/AccessControl.pm index c2324e8..b3fbe6d 100644 --- a/PVE/API2/AccessControl.pm +++ b/PVE/API2/AccessControl.pm @@ -6,7 +6,7 @@ use warnings; use JSON; use MIME::Base64; -use PVE::Exception qw(raise raise_perm_exc); +use PVE::Exception qw(raise raise_perm_exc raise_param_exc); use PVE::SafeSyslog; use PVE::RPCEnvironment; use PVE::Cluster qw(cfs_read_file); @@ -532,7 +532,7 @@ __PACKAGE__->register_method ({ # Regular users need to confirm their password to change u2f settings. if ($authuser ne 'root@pam') { - raise_param_exc('password' => 'password is required to modify u2f data') + raise_param_exc({ 'password' => 'password is required to modify u2f data' }) if !defined($password); my $domain_cfg = cfs_read_file('domains.cfg'); my $cfg = $domain_cfg->{ids}->{$realm}; @@ -564,7 +564,7 @@ __PACKAGE__->register_method ({ return $challenge; } } elsif ($action eq 'confirm') { - raise_param_exc('response' => "confirm action requires the 'response' parameter to be set") + raise_param_exc({ 'response' => "confirm action requires the 'response' parameter to be set" }) if !defined($response); my ($type, $u2fdata) = PVE::AccessControl::user_get_tfa($userid, $realm);