-
Notifications
You must be signed in to change notification settings - Fork 2k
[bug] Seed Password's strength [Closes #908] #909
Conversation
Yeah, looks good, and we missed that with the secure password. |
[bug] Seed Password's strength [Closes #908]
Thanks, got it. |
Bug persists, check to remove seed.js encryption like this: |
I can confirm this. The password being used for the seeded Users is the randomly generated hex. I think we have a couple options to fix..
My concern here would be the possibility of 3 or more consecutive characters (which isn't allowed with the password requirements) being generated by crypto. With a little bit of elbow grease we can inspect the generated password and make sure it adheres to the password requirements. It might not be pretty though :)
|
@lirantal I know you mentioned you were working on making this database seeding more testable. Have you made any progress on that? What are you thoughts on a possible fix for this? |
@blueflagbj Until a fix is merged in, a temporary solution would be to use the password's defined in the User objects on the seed configuration, rather than the randomly generated value. |
@blueflagbj posting some code (#909 (comment)) is not equal to reporting a bug. |
@lirantal The issue is in db seed configuration. The password being used for the seeded users, is a generated hex string that doesn't pass the owasp test when the model attempts to save. Thus, the users aren't being created. For reference: https://github.com/meanjs/mean/blob/master/config/lib/seed.js#L72-L73 I submitted #921 |
Yeah I can read the code too :) I'll reply with my comments on #921 |
Ok :) I agree with that. Thanks. |
No description provided.