You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Feb 22, 2024. It is now read-only.
as titled, I believe bcrypt generates its own salt every time the password is generated. I think it's better to detect if bcrypt is used then there should not be a runtime error like the one below.
RuntimeError: The configuration valueSECURITY_PASSWORD_SALTmust not be None when the value ofSECURITY_PASSWORD_HASHis set to "bcrypt
related: #268
The text was updated successfully, but these errors were encountered:
SECURITY_PASSWORD_SALT is used for "double salting" or "salting & peppering" (whatever you prefer). This is a common salt used in addition to the salt that bcrypt (or other algorithms) generate.
as titled, I believe bcrypt generates its own salt every time the password is generated. I think it's better to detect if bcrypt is used then there should not be a runtime error like the one below.
RuntimeError: The configuration value
SECURITY_PASSWORD_SALTmust not be None when the value of
SECURITY_PASSWORD_HASHis set to "bcrypt
related: #268
The text was updated successfully, but these errors were encountered: