-
-
Notifications
You must be signed in to change notification settings - Fork 423
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DRAFT][15.0][IMP] auth_password_pwned: check passwords against haveibeenpwned.com #645
base: 15.0
Are you sure you want to change the base?
Conversation
There hasn't been any activity on this pull request in the past 4 months, so it has been marked as stale and it will be closed automatically if no further activity occurs in the next 30 days. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Commit should be prefixed [ADD] not [IMP], since a new module has been created.
request.env["ir.config_parameter"] | ||
.sudo() | ||
.get_param("auth_signup.reset_password") | ||
== "True" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems aberrant to check for a string value to exactly equal True, but that does seem to match what the auth_signup module does.
|
||
super()._set_password() | ||
|
||
def _passswordshavebeenpwned(self, passwords): |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Misspelled _passsword with third s?
e8dd4be
to
1089bdb
Compare
1089bdb
to
7486e65
Compare
Adding a module that checks password hashes against the haveibeenpwned.com API to make sure publicly known passwords can not be set in Odoo and not used to login anymore. The user is forced to use password reset upon login if it is enabled, an email is sent to him (if auth_signup is installed) or he has to contact an admin to ensure a safe password change.
This is still work in progress. Feedback welcome.
Planned tasks (next week):
Further reading: