mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 11:55:37 +00:00 
			
		
		
		
	Turn default hash password algorightm back to pbkdf2 from argon2 until we found a better one (#14673)
* Turn default hash password algorightm back to pbkdf2 from argon2 until we found a better one * Add a warning on document
This commit is contained in:
		| @@ -565,7 +565,7 @@ ONLY_ALLOW_PUSH_IF_GITEA_ENVIRONMENT_SET = true | |||||||
| ;Classes include "lower,upper,digit,spec" | ;Classes include "lower,upper,digit,spec" | ||||||
| PASSWORD_COMPLEXITY = off | PASSWORD_COMPLEXITY = off | ||||||
| ; Password Hash algorithm, either "argon2", "pbkdf2", "scrypt" or "bcrypt" | ; Password Hash algorithm, either "argon2", "pbkdf2", "scrypt" or "bcrypt" | ||||||
| PASSWORD_HASH_ALGO = argon2 | PASSWORD_HASH_ALGO = pbkdf2 | ||||||
| ; Set false to allow JavaScript to read CSRF cookie | ; Set false to allow JavaScript to read CSRF cookie | ||||||
| CSRF_COOKIE_HTTP_ONLY = true | CSRF_COOKIE_HTTP_ONLY = true | ||||||
| ; Validate against https://haveibeenpwned.com/Passwords to see if a password has been exposed | ; Validate against https://haveibeenpwned.com/Passwords to see if a password has been exposed | ||||||
|   | |||||||
| @@ -401,7 +401,7 @@ relation to port exhaustion. | |||||||
| - `IMPORT_LOCAL_PATHS`: **false**: Set to `false` to prevent all users (including admin) from importing local path on server. | - `IMPORT_LOCAL_PATHS`: **false**: Set to `false` to prevent all users (including admin) from importing local path on server. | ||||||
| - `INTERNAL_TOKEN`: **\<random at every install if no uri set\>**: Secret used to validate communication within Gitea binary. | - `INTERNAL_TOKEN`: **\<random at every install if no uri set\>**: Secret used to validate communication within Gitea binary. | ||||||
| - `INTERNAL_TOKEN_URI`: **<empty>**: Instead of defining internal token in the configuration, this configuration option can be used to give Gitea a path to a file that contains the internal token (example value: `file:/etc/gitea/internal_token`) | - `INTERNAL_TOKEN_URI`: **<empty>**: Instead of defining internal token in the configuration, this configuration option can be used to give Gitea a path to a file that contains the internal token (example value: `file:/etc/gitea/internal_token`) | ||||||
| - `PASSWORD_HASH_ALGO`: **argon2**: The hash algorithm to use \[argon2, pbkdf2, scrypt, bcrypt\]. | - `PASSWORD_HASH_ALGO`: **pbkdf2**: The hash algorithm to use \[argon2, pbkdf2, scrypt, bcrypt\], argon2 will spend more memory than others. | ||||||
| - `CSRF_COOKIE_HTTP_ONLY`: **true**: Set false to allow JavaScript to read CSRF cookie. | - `CSRF_COOKIE_HTTP_ONLY`: **true**: Set false to allow JavaScript to read CSRF cookie. | ||||||
| - `MIN_PASSWORD_LENGTH`: **6**: Minimum password length for new users. | - `MIN_PASSWORD_LENGTH`: **6**: Minimum password length for new users. | ||||||
| - `PASSWORD_COMPLEXITY`: **off**: Comma separated list of character classes required to pass minimum complexity. If left empty or no valid values are specified, checking is disabled (off): | - `PASSWORD_COMPLEXITY`: **off**: Comma separated list of character classes required to pass minimum complexity. If left empty or no valid values are specified, checking is disabled (off): | ||||||
|   | |||||||
| @@ -804,7 +804,7 @@ func NewContext() { | |||||||
| 	DisableGitHooks = sec.Key("DISABLE_GIT_HOOKS").MustBool(true) | 	DisableGitHooks = sec.Key("DISABLE_GIT_HOOKS").MustBool(true) | ||||||
| 	DisableWebhooks = sec.Key("DISABLE_WEBHOOKS").MustBool(false) | 	DisableWebhooks = sec.Key("DISABLE_WEBHOOKS").MustBool(false) | ||||||
| 	OnlyAllowPushIfGiteaEnvironmentSet = sec.Key("ONLY_ALLOW_PUSH_IF_GITEA_ENVIRONMENT_SET").MustBool(true) | 	OnlyAllowPushIfGiteaEnvironmentSet = sec.Key("ONLY_ALLOW_PUSH_IF_GITEA_ENVIRONMENT_SET").MustBool(true) | ||||||
| 	PasswordHashAlgo = sec.Key("PASSWORD_HASH_ALGO").MustString("argon2") | 	PasswordHashAlgo = sec.Key("PASSWORD_HASH_ALGO").MustString("pbkdf2") | ||||||
| 	CSRFCookieHTTPOnly = sec.Key("CSRF_COOKIE_HTTP_ONLY").MustBool(true) | 	CSRFCookieHTTPOnly = sec.Key("CSRF_COOKIE_HTTP_ONLY").MustBool(true) | ||||||
| 	PasswordCheckPwn = sec.Key("PASSWORD_CHECK_PWN").MustBool(false) | 	PasswordCheckPwn = sec.Key("PASSWORD_CHECK_PWN").MustBool(false) | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user