mirror of
https://codeberg.org/forgejo/forgejo
synced 2024-11-30 13:56:09 +01:00
61b89747ed
This PR refactors and improves the password hashing code within gitea and makes it possible for server administrators to set the password hashing parameters In addition it takes the opportunity to adjust the settings for `pbkdf2` in order to make the hashing a little stronger. The majority of this work was inspired by PR #14751 and I would like to thank @boppy for their work on this. Thanks to @gusted for the suggestion to adjust the `pbkdf2` hashing parameters. Close #14751 --------- Signed-off-by: Andrew Thornton <art27@cantab.net> Co-authored-by: delvh <dev.lh@web.de> Co-authored-by: John Olheiser <john.olheiser@gmail.com> Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
29 lines
756 B
Go
29 lines
756 B
Go
// Copyright 2020 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package password
|
|
|
|
import (
|
|
"context"
|
|
|
|
"code.gitea.io/gitea/modules/auth/password/pwn"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
)
|
|
|
|
// IsPwned checks whether a password has been pwned
|
|
// NOTE: This func returns true if it encounters an error under the assumption that you ALWAYS want to check against
|
|
// HIBP, so not getting a response should block a password until it can be verified.
|
|
func IsPwned(ctx context.Context, password string) (bool, error) {
|
|
if !setting.PasswordCheckPwn {
|
|
return false, nil
|
|
}
|
|
|
|
client := pwn.New(pwn.WithContext(ctx))
|
|
count, err := client.CheckPassword(password, true)
|
|
if err != nil {
|
|
return true, err
|
|
}
|
|
|
|
return count > 0, nil
|
|
}
|