Skip to content

Conversation

@Nayana-R-Gowda
Copy link
Collaborator

Signed-off-by: NAYANAR nayana.r5@ibm.com

💡 Fix Description

How did you solve it? Key design points.
This block sets the password-strength policy by enforcing length, uppercase/lowercase rules, and whether numbers or special characters are mandatory

🧪 Verification

Check Command Status
Lint suite make lint pass
Unit tests make test pass

📐 MCP Compliance (if relevant)

  • Matches current MCP spec
  • No breaking change to MCP clients

✅ Checklist

  • Code formatted (make black isort pre-commit)
  • No secrets/credentials committed

…trap

- Add skip_password_validation parameter to create_user() method in
  EmailAuthService to allow bypassing password policy during bootstrap
- Change bootstrap_db.py to use create_platform_admin() which skips
  password validation for the initial admin user
- Update default password policy to require uppercase, lowercase, and
  special characters (password_require_uppercase, password_require_lowercase,
  password_require_special now default to true)
- Display password requirements dynamically in admin UI based on enabled
  policies
- Fix special character regex to include additional valid characters
- Add validation that old_password must be provided when changing password
- Update doctests and unit tests to use passwords that meet new defaults

Closes #1524

Signed-off-by: Mihai Criveti <crivetimihai@gmail.com>
Signed-off-by: Mihai Criveti <crivetimihai@gmail.com>
@crivetimihai crivetimihai merged commit 02bc252 into main Dec 12, 2025
46 of 48 checks passed
@crivetimihai crivetimihai deleted the testing branch December 12, 2025 14:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants