forked from go-gitea/gitea
-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Description
In the gitea auth there are these checks, IsComplexEnough IsPwned etc.
gitea/routers/web/user/auth.go
Lines 1174 to 1204 in 351aea3
| if !form.IsEmailDomainAllowed() { | |
| ctx.RenderWithErr(ctx.Tr("auth.email_domain_blacklisted"), tplSignUp, &form) | |
| return | |
| } | |
| if form.Password != form.Retype { | |
| ctx.Data["Err_Password"] = true | |
| ctx.RenderWithErr(ctx.Tr("form.password_not_match"), tplSignUp, &form) | |
| return | |
| } | |
| if len(form.Password) < setting.MinPasswordLength { | |
| ctx.Data["Err_Password"] = true | |
| ctx.RenderWithErr(ctx.Tr("auth.password_too_short", setting.MinPasswordLength), tplSignUp, &form) | |
| return | |
| } | |
| if !password.IsComplexEnough(form.Password) { | |
| ctx.Data["Err_Password"] = true | |
| ctx.RenderWithErr(password.BuildComplexityError(ctx), tplSignUp, &form) | |
| return | |
| } | |
| pwned, err := password.IsPwned(ctx, form.Password) | |
| if pwned { | |
| errMsg := ctx.Tr("auth.password_pwned") | |
| if err != nil { | |
| log.Error(err.Error()) | |
| errMsg = ctx.Tr("auth.password_pwned_err") | |
| } | |
| ctx.Data["Err_Password"] = true | |
| ctx.RenderWithErr(errMsg, tplSignUp, &form) | |
| return | |
| } |
We don't do any of that in our auth endpoint. We should.
Metadata
Metadata
Assignees
Labels
No labels