mirror of
https://codeberg.org/forgejo/forgejo
synced 2024-11-25 11:16:11 +01:00
Update minimum password length requirements (#25946)
This commit is contained in:
parent
02a45e8d58
commit
b3f7137174
|
@ -454,7 +454,7 @@ INTERNAL_TOKEN=
|
||||||
;REVERSE_PROXY_TRUSTED_PROXIES = 127.0.0.0/8,::1/128
|
;REVERSE_PROXY_TRUSTED_PROXIES = 127.0.0.0/8,::1/128
|
||||||
;;
|
;;
|
||||||
;; The minimum password length for new Users
|
;; The minimum password length for new Users
|
||||||
;MIN_PASSWORD_LENGTH = 6
|
;MIN_PASSWORD_LENGTH = 8
|
||||||
;;
|
;;
|
||||||
;; Set to true to allow users to import local server paths
|
;; Set to true to allow users to import local server paths
|
||||||
;IMPORT_LOCAL_PATHS = false
|
;IMPORT_LOCAL_PATHS = false
|
||||||
|
|
|
@ -559,7 +559,7 @@ And the following unique queues:
|
||||||
- `scrypt`: `scrypt$65536$16$2$50`
|
- `scrypt`: `scrypt$65536$16$2$50`
|
||||||
- Adjusting the algorithm parameters using this functionality is done at your own risk.
|
- Adjusting the algorithm parameters using this functionality is done at your own risk.
|
||||||
- `CSRF_COOKIE_HTTP_ONLY`: **true**: Set false to allow JavaScript to read CSRF cookie.
|
- `CSRF_COOKIE_HTTP_ONLY`: **true**: Set false to allow JavaScript to read CSRF cookie.
|
||||||
- `MIN_PASSWORD_LENGTH`: **6**: Minimum password length for new users.
|
- `MIN_PASSWORD_LENGTH`: **8**: Minimum password length for new users.
|
||||||
- `PASSWORD_COMPLEXITY`: **off**: Comma separated list of character classes required to pass minimum complexity. If left empty or no valid values are specified, checking is disabled (off):
|
- `PASSWORD_COMPLEXITY`: **off**: Comma separated list of character classes required to pass minimum complexity. If left empty or no valid values are specified, checking is disabled (off):
|
||||||
- lower - use one or more lower latin characters
|
- lower - use one or more lower latin characters
|
||||||
- upper - use one or more upper latin characters
|
- upper - use one or more upper latin characters
|
||||||
|
|
|
@ -124,7 +124,7 @@ func loadSecurityFrom(rootCfg ConfigProvider) {
|
||||||
ReverseProxyTrustedProxies = []string{"127.0.0.0/8", "::1/128"}
|
ReverseProxyTrustedProxies = []string{"127.0.0.0/8", "::1/128"}
|
||||||
}
|
}
|
||||||
|
|
||||||
MinPasswordLength = sec.Key("MIN_PASSWORD_LENGTH").MustInt(6)
|
MinPasswordLength = sec.Key("MIN_PASSWORD_LENGTH").MustInt(8)
|
||||||
ImportLocalPaths = sec.Key("IMPORT_LOCAL_PATHS").MustBool(false)
|
ImportLocalPaths = sec.Key("IMPORT_LOCAL_PATHS").MustBool(false)
|
||||||
DisableGitHooks = sec.Key("DISABLE_GIT_HOOKS").MustBool(true)
|
DisableGitHooks = sec.Key("DISABLE_GIT_HOOKS").MustBool(true)
|
||||||
DisableWebhooks = sec.Key("DISABLE_WEBHOOKS").MustBool(false)
|
DisableWebhooks = sec.Key("DISABLE_WEBHOOKS").MustBool(false)
|
||||||
|
|
|
@ -18,8 +18,8 @@ test('Test Register Form', async ({page}, workerInfo) => {
|
||||||
await expect(response?.status()).toBe(200); // Status OK
|
await expect(response?.status()).toBe(200); // Status OK
|
||||||
await page.type('input[name=user_name]', `e2e-test-${workerInfo.workerIndex}`);
|
await page.type('input[name=user_name]', `e2e-test-${workerInfo.workerIndex}`);
|
||||||
await page.type('input[name=email]', `e2e-test-${workerInfo.workerIndex}@test.com`);
|
await page.type('input[name=email]', `e2e-test-${workerInfo.workerIndex}@test.com`);
|
||||||
await page.type('input[name=password]', 'test123');
|
await page.type('input[name=password]', 'test123test123');
|
||||||
await page.type('input[name=retype]', 'test123');
|
await page.type('input[name=retype]', 'test123test123');
|
||||||
await page.click('form button.ui.green.button:visible');
|
await page.click('form button.ui.green.button:visible');
|
||||||
// Make sure we routed to the home page. Else login failed.
|
// Make sure we routed to the home page. Else login failed.
|
||||||
await expect(page.url()).toBe(`${workerInfo.project.use.baseURL}/`);
|
await expect(page.url()).toBe(`${workerInfo.project.use.baseURL}/`);
|
||||||
|
|
Loading…
Reference in a new issue