mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2025-10-29 14:52:26 -05:00
[feature] Include password strength in error message when password strength is too low (#550)
* When password validation fails, return how close to enough entropy it has. * Shorter version of low-strength password error message
This commit is contained in:
parent
5004e0a9da
commit
b24b71c0a4
4 changed files with 18 additions and 8 deletions
|
|
@ -22,6 +22,7 @@ import (
|
|||
"errors"
|
||||
"fmt"
|
||||
"net/mail"
|
||||
"strings"
|
||||
|
||||
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
||||
"github.com/superseriousbusiness/gotosocial/internal/regexes"
|
||||
|
|
@ -53,7 +54,16 @@ func NewPassword(password string) error {
|
|||
return fmt.Errorf("password should be no more than %d chars", maximumPasswordLength)
|
||||
}
|
||||
|
||||
return pwv.Validate(password, minimumPasswordEntropy)
|
||||
if err := pwv.Validate(password, minimumPasswordEntropy); err != nil {
|
||||
// Modify error message to include percentage requred entropy the password has
|
||||
percent := int(100 * pwv.GetEntropy(password) / minimumPasswordEntropy)
|
||||
return errors.New(strings.ReplaceAll(
|
||||
err.Error(),
|
||||
"insecure password",
|
||||
fmt.Sprintf("password is %d%% strength", percent)))
|
||||
}
|
||||
|
||||
return nil // pasword OK
|
||||
}
|
||||
|
||||
// Username makes sure that a given username is valid (ie., letters, numbers, underscores, check length).
|
||||
|
|
|
|||
|
|
@ -50,22 +50,22 @@ func (suite *ValidationTestSuite) TestCheckPasswordStrength() {
|
|||
|
||||
err = validate.NewPassword(terriblePassword)
|
||||
if assert.Error(suite.T(), err) {
|
||||
assert.Equal(suite.T(), errors.New("insecure password, try including more special characters, using uppercase letters, using numbers or using a longer password"), err)
|
||||
assert.Equal(suite.T(), errors.New("password is 62% strength, try including more special characters, using uppercase letters, using numbers or using a longer password"), err)
|
||||
}
|
||||
|
||||
err = validate.NewPassword(weakPassword)
|
||||
if assert.Error(suite.T(), err) {
|
||||
assert.Equal(suite.T(), errors.New("insecure password, try including more special characters, using numbers or using a longer password"), err)
|
||||
assert.Equal(suite.T(), errors.New("password is 95% strength, try including more special characters, using numbers or using a longer password"), err)
|
||||
}
|
||||
|
||||
err = validate.NewPassword(shortPassword)
|
||||
if assert.Error(suite.T(), err) {
|
||||
assert.Equal(suite.T(), errors.New("insecure password, try including more special characters or using a longer password"), err)
|
||||
assert.Equal(suite.T(), errors.New("password is 39% strength, try including more special characters or using a longer password"), err)
|
||||
}
|
||||
|
||||
err = validate.NewPassword(specialPassword)
|
||||
if assert.Error(suite.T(), err) {
|
||||
assert.Equal(suite.T(), errors.New("insecure password, try including more special characters or using a longer password"), err)
|
||||
assert.Equal(suite.T(), errors.New("password is 53% strength, try including more special characters or using a longer password"), err)
|
||||
}
|
||||
|
||||
err = validate.NewPassword(longPassword)
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue