mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-10-31 22:40:01 +00:00
[bugfix] Change maximumPasswordLength to 72 bytes (#2012)
This commit is contained in:
parent
95e2024c2a
commit
d6fa74e5dc
2 changed files with 23 additions and 18 deletions
|
@ -21,7 +21,6 @@
|
|||
"errors"
|
||||
"fmt"
|
||||
"net/mail"
|
||||
"strings"
|
||||
|
||||
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
||||
"github.com/superseriousbusiness/gotosocial/internal/config"
|
||||
|
@ -32,8 +31,8 @@
|
|||
)
|
||||
|
||||
const (
|
||||
maximumPasswordLength = 256
|
||||
minimumPasswordEntropy = 60 // dictates password strength. See https://github.com/wagslane/go-password-validator
|
||||
maximumPasswordLength = 72 // 72 bytes is the maximum length afforded by bcrypt. See https://pkg.go.dev/golang.org/x/crypto/bcrypt#GenerateFromPassword.
|
||||
minimumPasswordEntropy = 60 // Heuristic for password strength. See https://github.com/wagslane/go-password-validator.
|
||||
minimumReasonLength = 40
|
||||
maximumReasonLength = 500
|
||||
maximumSiteTitleLength = 40
|
||||
|
@ -47,23 +46,29 @@
|
|||
maximumListTitleLength = 200
|
||||
)
|
||||
|
||||
// NewPassword returns an error if the given password is not sufficiently strong, or nil if it's ok.
|
||||
// NewPassword returns a helpful error if the given password
|
||||
// is too short, too long, or not sufficiently strong.
|
||||
func NewPassword(password string) error {
|
||||
if password == "" {
|
||||
return errors.New("no password provided")
|
||||
}
|
||||
|
||||
if len([]rune(password)) > maximumPasswordLength {
|
||||
return fmt.Errorf("password should be no more than %d chars", maximumPasswordLength)
|
||||
// Ensure length is OK first.
|
||||
if pwLen := len(password); pwLen == 0 {
|
||||
return errors.New("no password provided / provided password was 0 bytes")
|
||||
} else if pwLen > maximumPasswordLength {
|
||||
return fmt.Errorf(
|
||||
"password should be no more than %d bytes, provided password was %d bytes",
|
||||
maximumPasswordLength, pwLen,
|
||||
)
|
||||
}
|
||||
|
||||
if err := pwv.Validate(password, minimumPasswordEntropy); err != nil {
|
||||
// Modify error message to include percentage requred entropy the password has
|
||||
percent := int(100 * pwv.GetEntropy(password) / minimumPasswordEntropy)
|
||||
return errors.New(strings.ReplaceAll(
|
||||
err.Error(),
|
||||
"insecure password",
|
||||
fmt.Sprintf("password is only %d%% strength", percent)))
|
||||
// Calculate the percentage of our desired entropy this password fulfils.
|
||||
entropyPercent := int(100 * pwv.GetEntropy(password) / minimumPasswordEntropy)
|
||||
|
||||
// Replace the first 17 bytes (`insecure password`)
|
||||
// of the error string with our own entropy message.
|
||||
entropyMsg := fmt.Sprintf("password is only %d%% strength", entropyPercent)
|
||||
errMsg := entropyMsg + err.Error()[17:]
|
||||
|
||||
return errors.New(errMsg)
|
||||
}
|
||||
|
||||
return nil // password OK
|
||||
|
|
|
@ -45,7 +45,7 @@ func (suite *ValidationTestSuite) TestCheckPasswordStrength() {
|
|||
|
||||
err = validate.NewPassword(empty)
|
||||
if suite.Error(err) {
|
||||
suite.Equal(errors.New("no password provided"), err)
|
||||
suite.Equal(errors.New("no password provided / provided password was 0 bytes"), err)
|
||||
}
|
||||
|
||||
err = validate.NewPassword(terriblePassword)
|
||||
|
@ -75,7 +75,7 @@ func (suite *ValidationTestSuite) TestCheckPasswordStrength() {
|
|||
|
||||
err = validate.NewPassword(tooLong)
|
||||
if suite.Error(err) {
|
||||
suite.Equal(errors.New("password should be no more than 256 chars"), err)
|
||||
suite.Equal(errors.New("password should be no more than 72 bytes, provided password was 571 bytes"), err)
|
||||
}
|
||||
|
||||
err = validate.NewPassword(strongPassword)
|
||||
|
|
Loading…
Reference in a new issue