aboutsummaryrefslogtreecommitdiffstats
path: root/custom
diff options
context:
space:
mode:
authorLunny Xiao <xiaolunwen@gmail.com>2021-02-14 01:03:29 +0800
committerGitHub <noreply@github.com>2021-02-13 18:03:29 +0100
commit5e4fa7c703726cfc18ce8741a5d829173f3fec5c (patch)
treef8e6f1965d04f5f39979a269f95d260b351a9b89 /custom
parented834126a67aabbe027495d6a79fe415a4be7890 (diff)
downloadgitea-5e4fa7c703726cfc18ce8741a5d829173f3fec5c.tar.gz
gitea-5e4fa7c703726cfc18ce8741a5d829173f3fec5c.zip
Turn default hash password algorightm back to pbkdf2 from argon2 until we found a better one (#14673)
* Turn default hash password algorightm back to pbkdf2 from argon2 until we found a better one * Add a warning on document
Diffstat (limited to 'custom')
-rw-r--r--custom/conf/app.example.ini2
1 files changed, 1 insertions, 1 deletions
diff --git a/custom/conf/app.example.ini b/custom/conf/app.example.ini
index 747173b5ae..276b3cb5e8 100644
--- a/custom/conf/app.example.ini
+++ b/custom/conf/app.example.ini
@@ -565,7 +565,7 @@ ONLY_ALLOW_PUSH_IF_GITEA_ENVIRONMENT_SET = true
;Classes include "lower,upper,digit,spec"
PASSWORD_COMPLEXITY = off
; Password Hash algorithm, either "argon2", "pbkdf2", "scrypt" or "bcrypt"
-PASSWORD_HASH_ALGO = argon2
+PASSWORD_HASH_ALGO = pbkdf2
; Set false to allow JavaScript to read CSRF cookie
CSRF_COOKIE_HTTP_ONLY = true
; Validate against https://haveibeenpwned.com/Passwords to see if a password has been exposed