mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 16:25:55 +03:00
[PR #1024] [CLOSED] Adding regex to support basic complexity requirements. #1081
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#1081
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/lldap/lldap/pull/1024
Author: @gplubeck
Created: 11/1/2024
Status: ❌ Closed
Base:
main← Head:main📝 Commits (2)
c075f6eAdding regex to support basic complexity requirements.be81535adding password length requirement as well.📊 Changes
2 files changed (+23 additions, -1 deletions)
View changed files
📝
app/Cargo.toml(+1 -0)📝
app/src/components/change_password.rs(+22 -1)📄 Description
There appear to be a number of requests for volunteer organizations or small businesses (521, 783, etc) that want basic password complexity. This pull request would add the ability to to add pseudo complex password. I know length is better indicator for initial password and entropy for password changes, but government organizations have their rules.
I am also tracking this doesn't enforce it on the back-end, nor with creation of an account. This was purposeful as being an admin and creating an account with password or something easy to remember can be useful at times. Additionally if you are changing the password via the cli, you have enough access to do whatever you want and should be responsible for your actions.
What this pull request is missing:
Not sure how lldap wants to support configuration. Right now this merely replaces the empty_or_long validation. Obviously this is not a good approach as it would be better implemented as a turn on when needed configuration. Open to suggestions for how lldap usually does this.
Might be useful to add a database field for when passwords are changed. This could be used to ensure password have been changed after a breach. Additionally, for people like issue 783 they could update their clients to request the attribute if they really want. I am open to implementing this, but don't ever rust so would appreciate a push in the right direction.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.