mirror of
https://github.com/go-gitea/gitea
synced 2024-11-09 11:44:27 +00:00
ef11d41639
During the recent hash algorithm change it became clear that the choice of password hash algorithm plays a role in the time taken for CI to run. Therefore as attempt to improve CI we should consider using a dummy hashing algorithm instead of a real hashing algorithm. This PR creates a dummy algorithm which is then set as the default hashing algorithm during tests that use the fixtures. This hopefully will cause a reduction in the time it takes for CI to run. --------- Signed-off-by: Andrew Thornton <art27@cantab.net> Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
68 lines
1.8 KiB
Go
68 lines
1.8 KiB
Go
// Copyright 2023 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package hash
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"strings"
|
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"golang.org/x/crypto/scrypt"
|
|
)
|
|
|
|
func init() {
|
|
MustRegister("scrypt", NewScryptHasher)
|
|
}
|
|
|
|
// ScryptHasher implements PasswordHasher
|
|
// and uses the scrypt key derivation function.
|
|
type ScryptHasher struct {
|
|
n, r, p, keyLen int
|
|
}
|
|
|
|
// HashWithSaltBytes a provided password and salt
|
|
func (hasher *ScryptHasher) HashWithSaltBytes(password string, salt []byte) string {
|
|
if hasher == nil {
|
|
return ""
|
|
}
|
|
hashedPassword, _ := scrypt.Key([]byte(password), salt, hasher.n, hasher.r, hasher.p, hasher.keyLen)
|
|
return hex.EncodeToString(hashedPassword)
|
|
}
|
|
|
|
// NewScryptHasher is a factory method to create an ScryptHasher
|
|
// The provided config should be either empty or of the form:
|
|
// "<n>$<r>$<p>$<keyLen>", where <x> is the string representation
|
|
// of an integer
|
|
func NewScryptHasher(config string) *ScryptHasher {
|
|
// This matches the original configuration for `scrypt` prior to storing hash parameters
|
|
// in the database.
|
|
// THESE VALUES MUST NOT BE CHANGED OR BACKWARDS COMPATIBILITY WILL BREAK
|
|
hasher := &ScryptHasher{
|
|
n: 1 << 16,
|
|
r: 16,
|
|
p: 2, // 2 passes through memory - this default config will use 128MiB in total.
|
|
keyLen: 50,
|
|
}
|
|
|
|
if config == "" {
|
|
return hasher
|
|
}
|
|
|
|
vals := strings.SplitN(config, "$", 4)
|
|
if len(vals) != 4 {
|
|
log.Error("invalid scrypt hash spec %s", config)
|
|
return nil
|
|
}
|
|
var err error
|
|
hasher.n, err = parseIntParam(vals[0], "n", "scrypt", config, nil)
|
|
hasher.r, err = parseIntParam(vals[1], "r", "scrypt", config, err)
|
|
hasher.p, err = parseIntParam(vals[2], "p", "scrypt", config, err)
|
|
hasher.keyLen, err = parseIntParam(vals[3], "keyLen", "scrypt", config, err)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
return hasher
|
|
}
|