Skip to content

Commit e5b8b4b

Browse files
bkcsoftlafriks
authored andcommitted
Cleanup models.User.HashPassword (#3334)
1 parent 9aed180 commit e5b8b4b

File tree

7 files changed

+18
-23
lines changed

7 files changed

+18
-23
lines changed

cmd/admin.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,11 +107,10 @@ func runChangePassword(c *cli.Context) error {
107107
if err != nil {
108108
return fmt.Errorf("%v", err)
109109
}
110-
user.Passwd = c.String("password")
111110
if user.Salt, err = models.GetUserSalt(); err != nil {
112111
return fmt.Errorf("%v", err)
113112
}
114-
user.HashPassword()
113+
user.HashPassword(c.String("password"))
115114
if err := models.UpdateUserCols(user, "passwd", "salt"); err != nil {
116115
return fmt.Errorf("%v", err)
117116
}

models/user.go

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -388,17 +388,20 @@ func (u *User) NewGitSig() *git.Signature {
388388
}
389389
}
390390

391+
func hashPassword(passwd, salt string) string {
392+
tempPasswd := pbkdf2.Key([]byte(passwd), []byte(salt), 10000, 50, sha256.New)
393+
return fmt.Sprintf("%x", tempPasswd)
394+
}
395+
391396
// HashPassword hashes a password using PBKDF.
392-
func (u *User) HashPassword() {
393-
newPasswd := pbkdf2.Key([]byte(u.Passwd), []byte(u.Salt), 10000, 50, sha256.New)
394-
u.Passwd = fmt.Sprintf("%x", newPasswd)
397+
func (u *User) HashPassword(passwd string) {
398+
u.Passwd = hashPassword(passwd, u.Salt)
395399
}
396400

397401
// ValidatePassword checks if given password matches the one belongs to the user.
398402
func (u *User) ValidatePassword(passwd string) bool {
399-
newUser := &User{Passwd: passwd, Salt: u.Salt}
400-
newUser.HashPassword()
401-
return subtle.ConstantTimeCompare([]byte(u.Passwd), []byte(newUser.Passwd)) == 1
403+
tempHash := hashPassword(passwd, u.Salt)
404+
return subtle.ConstantTimeCompare([]byte(u.Passwd), []byte(tempHash)) == 1
402405
}
403406

404407
// IsPasswordSet checks if the password is set or left empty
@@ -711,7 +714,7 @@ func CreateUser(u *User) (err error) {
711714
if u.Salt, err = GetUserSalt(); err != nil {
712715
return err
713716
}
714-
u.HashPassword()
717+
u.HashPassword(u.Passwd)
715718
u.AllowCreateOrganization = setting.Service.DefaultAllowCreateOrganization
716719
u.MaxRepoCreation = -1
717720

models/user_test.go

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -135,13 +135,11 @@ func TestHashPasswordDeterministic(t *testing.T) {
135135
pass := string(b)
136136

137137
// save the current password in the user - hash it and store the result
138-
u.Passwd = pass
139-
u.HashPassword()
138+
u.HashPassword(pass)
140139
r1 := u.Passwd
141140

142141
// run again
143-
u.Passwd = pass
144-
u.HashPassword()
142+
u.HashPassword(pass)
145143
r2 := u.Passwd
146144

147145
// assert equal (given the same salt+pass, the same result is produced)
@@ -158,7 +156,6 @@ func BenchmarkHashPassword(b *testing.B) {
158156
u := &User{Salt: string(bs), Passwd: pass}
159157
b.ResetTimer()
160158
for i := 0; i < b.N; i++ {
161-
u.HashPassword()
162-
u.Passwd = pass
159+
u.HashPassword(pass)
163160
}
164161
}

routers/admin/users.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -194,13 +194,12 @@ func EditUserPost(ctx *context.Context, form auth.AdminEditUserForm) {
194194
}
195195

196196
if len(form.Password) > 0 {
197-
u.Passwd = form.Password
198197
var err error
199198
if u.Salt, err = models.GetUserSalt(); err != nil {
200199
ctx.ServerError("UpdateUser", err)
201200
return
202201
}
203-
u.HashPassword()
202+
u.HashPassword(form.Password)
204203
}
205204

206205
u.LoginName = form.LoginName

routers/api/v1/admin/user.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,13 +126,12 @@ func EditUser(ctx *context.APIContext, form api.EditUserOption) {
126126
}
127127

128128
if len(form.Password) > 0 {
129-
u.Passwd = form.Password
130129
var err error
131130
if u.Salt, err = models.GetUserSalt(); err != nil {
132131
ctx.Error(500, "UpdateUser", err)
133132
return
134133
}
135-
u.HashPassword()
134+
u.HashPassword(form.Password)
136135
}
137136

138137
u.LoginName = form.LoginName

routers/user/auth.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -984,7 +984,6 @@ func ResetPasswdPost(ctx *context.Context) {
984984
return
985985
}
986986

987-
u.Passwd = passwd
988987
var err error
989988
if u.Rands, err = models.GetUserSalt(); err != nil {
990989
ctx.ServerError("UpdateUser", err)
@@ -994,7 +993,7 @@ func ResetPasswdPost(ctx *context.Context) {
994993
ctx.ServerError("UpdateUser", err)
995994
return
996995
}
997-
u.HashPassword()
996+
u.HashPassword(passwd)
998997
if err := models.UpdateUserCols(u, "passwd", "rands", "salt"); err != nil {
999998
ctx.ServerError("UpdateUser", err)
1000999
return

routers/user/setting.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -229,13 +229,12 @@ func SettingsSecurityPost(ctx *context.Context, form auth.ChangePasswordForm) {
229229
} else if form.Password != form.Retype {
230230
ctx.Flash.Error(ctx.Tr("form.password_not_match"))
231231
} else {
232-
ctx.User.Passwd = form.Password
233232
var err error
234233
if ctx.User.Salt, err = models.GetUserSalt(); err != nil {
235234
ctx.ServerError("UpdateUser", err)
236235
return
237236
}
238-
ctx.User.HashPassword()
237+
ctx.User.HashPassword(form.Password)
239238
if err := models.UpdateUserCols(ctx.User, "salt", "passwd"); err != nil {
240239
ctx.ServerError("UpdateUser", err)
241240
return

0 commit comments

Comments
 (0)