Skip to content

Conversation

gaby
Copy link
Member

@gaby gaby commented Jul 30, 2025

Summary

  • drop SHA-1 and MD5 handling from BasicAuth
  • document that Authorizer receives a hashed password
  • update BasicAuth docs and what's new guide
  • clean up related tests

Copy link
Contributor

coderabbitai bot commented Jul 30, 2025

Walkthrough

Support for SHA1 and MD5 password hashes has been removed from the BasicAuth middleware. Documentation and tests have been updated to reflect that only SHA256, SHA512, and bcrypt password hash formats are now supported. Code handling and test cases for SHA1 and MD5 have been deleted.

Changes

Cohort / File(s) Change Summary
Documentation: BasicAuth Hash Support
docs/middleware/basicauth.md, docs/whats_new.md
Updated documentation to remove references to {SHA} (SHA1) and {MD5} hash prefixes. Only {SHA256}, {SHA512}, and bcrypt strings are now documented as supported.
Test Code Cleanup: SHA1/MD5 Removal
middleware/basicauth/basicauth_test.go
Deleted imports, helper functions, and test cases related to SHA1 and MD5 password hash variants.
Core Logic: Hash Parsing
middleware/basicauth/config.go
Removed SHA1 and MD5 hash support from the password parsing logic. Only SHA256, SHA512, and bcrypt remain supported.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~8 minutes

Possibly related PRs

Suggested labels

📒 Documentation

Suggested reviewers

  • sixcolors
  • ReneWerner87

Poem

In the warren of code, two hashes retire,
No more MD5 or SHA1 to admire.
Only the strong—SHA256, SHA512—remain,
With bcrypt beside them, secure in the chain.
The docs and the tests now hop in a line,
As Fiber’s auth middleware continues to shine!
🐇✨

Note

⚡️ Unit Test Generation is now available in beta!

Learn more here, or try it out under "Finishing Touches" below.

✨ Finishing Touches
  • 📝 Generate Docstrings
🧪 Generate unit tests
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch 2025-07-30-13-21-18

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Explain this complex logic.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai explain this code block.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and explain its main purpose.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Support

Need help? Create a ticket on our support page for assistance with any issues or questions.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai generate sequence diagram to generate a sequence diagram of the changes in this PR.
  • @coderabbitai generate unit tests to generate unit tests for this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Summary of Changes

Hello @gaby, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

I've prepared this pull request to enhance the security of the BasicAuth middleware by removing support for the cryptographically weak SHA-1 and MD5 hashing algorithms. This change ensures that only stronger, more secure hashing methods are used for password authentication. Alongside the core logic update, I've also clarified the documentation to explicitly state that the Authorizer function receives a hashed password, and I've cleaned up associated test cases.

Highlights

  • Security Enhancement: Deprecated SHA-1 and MD5 hashing algorithms have been removed from the BasicAuth middleware, improving the security posture by enforcing stronger hashing standards.
  • Documentation Update: The documentation for BasicAuth, including basicauth.md and whats_new.md, has been updated to reflect the removal of SHA-1 and MD5 support and to clarify that the Authorizer function now explicitly receives a hashed password.
  • Codebase Cleanup: Related test cases and helper functions for SHA-1 and MD5 have been removed from basicauth_test.go, and the config.go file no longer imports or processes these outdated hash types.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point in your pull request via creating an issue comment (i.e. comment on the pull request page) using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in issue comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments or fill out our survey to provide feedback.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request correctly removes support for the insecure SHA-1 and MD5 hashing algorithms from the BasicAuth middleware, which is an important security enhancement. The changes are consistently applied throughout the code, tests, and documentation. However, I've found a critical issue in the updated documentation for the Authorizer function. Both the code comments and the markdown documentation incorrectly state that the Authorizer receives a hashed password, when it actually receives the plaintext password provided by the client. This is a significant documentation bug that could lead developers to implement insecure custom authorizers. I've left detailed comments on the specific lines with suggestions for correction.

Copy link

codecov bot commented Jul 30, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 91.82%. Comparing base (2e544ae) to head (b7ad4f2).
⚠️ Report is 1 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #3634      +/-   ##
==========================================
+ Coverage   91.78%   91.82%   +0.03%     
==========================================
  Files         113      113              
  Lines       11444    11426      -18     
==========================================
- Hits        10504    10492      -12     
+ Misses        675      671       -4     
+ Partials      265      263       -2     
Flag Coverage Δ
unittests 91.82% <ø> (+0.03%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@gaby gaby added this to v3 Jul 30, 2025
@gaby gaby added this to the v3 milestone Jul 30, 2025
@gaby gaby moved this to In Progress in v3 Jul 30, 2025
@gaby gaby changed the title Remove SHA-1/MD5 support in BasicAuth 🧹 chore: Remove SHA-1/MD5 support in BasicAuth middleware Jul 30, 2025
gaby and others added 2 commits July 30, 2025 09:24
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
@gaby gaby marked this pull request as ready for review July 30, 2025 13:25
@Copilot Copilot AI review requested due to automatic review settings July 30, 2025 13:25
@gaby gaby requested a review from a team as a code owner July 30, 2025 13:25
Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR removes support for insecure SHA-1 and MD5 hashing algorithms from the BasicAuth middleware as part of security hardening. The change maintains support for more secure alternatives like SHA-256, SHA-512, and bcrypt while dropping the weaker cryptographic functions.

Key changes:

  • Remove SHA-1 and MD5 parsing logic from the password hash detection code
  • Clean up related test helper functions and test cases
  • Update documentation to reflect the removed hash algorithm support

Reviewed Changes

Copilot reviewed 4 out of 4 changed files in this pull request and generated 1 comment.

File Description
middleware/basicauth/config.go Removes SHA-1/MD5 imports and password parsing logic for these weak hash algorithms
middleware/basicauth/basicauth_test.go Removes SHA-1/MD5 test helper functions and eliminates related test cases
docs/whats_new.md Updates documentation to remove references to SHA-1/MD5 support
docs/middleware/basicauth.md Updates middleware documentation to reflect removed hash algorithm support

@@ -66,8 +66,7 @@ Getting the username and password
Passwords must be supplied in pre-hashed form. The middleware detects the
hashing algorithm from a prefix:
Copy link
Preview

Copilot AI Jul 30, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The documentation should clarify that the Authorizer function receives the hashed password, not the plaintext password, as mentioned in the PR description. Consider adding a note about this important detail for developers implementing custom authorization logic.

Suggested change
hashing algorithm from a prefix:
hashing algorithm from a prefix. The `Authorizer` function receives the hashed password, not the plaintext password. Developers should ensure their custom logic accounts for this.

Copilot uses AI. Check for mistakes.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🔭 Outside diff range comments (3)
docs/whats_new.md (1)

1948-1954: Clarify that Authorizer now receives hashed password

The text introduces the new requirement that passwords must be pre-hashed, but it doesn’t explicitly state that the Authorizer callback is now invoked with that hashed value (per the implementation change in PR #3634). This is an essential behavioural change and must be called out here to prevent existing handlers from blindly comparing plaintext strings.

Please add one sentence such as:

“Note: the Authorizer function now receives the hashed password, not the plaintext sent by the client.”

docs/middleware/basicauth.md (2)

66-74: Mismatch between documentation and runtime behaviour for hash detection

The bullet list removes {SHA}/{MD5} – good – but it still claims that absence of a prefix allows either hex or base64 encoded SHA-256.
Implementation (parseHashedPassword) only accepts the 64-byte hex form; base64 without a prefix is rejected and yields “invalid hash” (see middleware/basicauth/config.go).

Diff suggestion:

-If no prefix is present the value is interpreted as a SHA-256 digest encoded in
-hex or base64.
+If no prefix is present the value is interpreted as a **hex-encoded** SHA-256
+digest (64 hexadecimal characters).

This avoids confusing integrators who would otherwise provide an unsupported format.


88-95: StorePassword / Authorizer wording still says plaintext

After PR #3634 the middleware hashes the provided password before:

  1. calling the custom Authorizer
  2. optionally storing it with StorePassword

The table still states “plaintext password”. Update both descriptions to “hashed password” (or “password hash”) to reflect actual behaviour and avoid security-sensitive mistakes.

🧹 Nitpick comments (1)
docs/middleware/basicauth.md (1)

52-58: Example Authorizer should compare hashes, not usernames only

The custom Authorizer in the example returns true for any request where the
user is john or admin, regardless of the password. That defeats the
purpose of authentication and is dangerous to copy-paste.

Replace with a realistic check, e.g.:

Authorizer: func(user, passHash string, _ fiber.Ctx) bool {
    expected, ok := map[string]string{
        "john":  "{SHA256}eZ75K…",
        "admin": "$2a$10$gTYwC…",
    }[user]
    return ok && passHash == expected
},
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 2e544ae and b7ad4f2.

📒 Files selected for processing (4)
  • docs/middleware/basicauth.md (1 hunks)
  • docs/whats_new.md (1 hunks)
  • middleware/basicauth/basicauth_test.go (0 hunks)
  • middleware/basicauth/config.go (0 hunks)
💤 Files with no reviewable changes (2)
  • middleware/basicauth/basicauth_test.go
  • middleware/basicauth/config.go
🧰 Additional context used
📓 Path-based instructions (1)
docs/**

📄 CodeRabbit Inference Engine (.github/copilot-instructions.md)

Review and update the contents of the docs folder if necessary when modifying code

Files:

  • docs/whats_new.md
  • docs/middleware/basicauth.md
🧠 Learnings (3)
📓 Common learnings
Learnt from: ReneWerner87
PR: gofiber/fiber#0
File: :0-0
Timestamp: 2024-12-01T10:28:36.011Z
Learning: Feature request #3224 has been created to add support for square bracket notation and comma-separated values in multipart form data in Fiber, while maintaining binary data transfer capabilities. This would bring parity with the existing form-urlencoded functionality.
Learnt from: ReneWerner87
PR: gofiber/fiber#3161
File: app.go:923-932
Timestamp: 2024-11-15T07:56:21.623Z
Learning: In the Fiber framework, breaking changes are acceptable when moving from version 2 to version 3, including modifications to method signatures such as in the `Test` method in `app.go`.
Learnt from: gaby
PR: gofiber/fiber#3056
File: middleware/encryptcookie/utils.go:51-54
Timestamp: 2024-07-01T03:33:22.283Z
Learning: Unit tests for key length enforcement in `DecryptCookie` have been added to ensure consistency and security in the encryption processes.
Learnt from: gaby
PR: gofiber/fiber#3056
File: middleware/encryptcookie/utils.go:51-54
Timestamp: 2024-10-08T19:06:06.583Z
Learning: Unit tests for key length enforcement in `DecryptCookie` have been added to ensure consistency and security in the encryption processes.
Learnt from: gaby
PR: gofiber/fiber#3056
File: middleware/encryptcookie/utils.go:20-23
Timestamp: 2024-07-01T03:44:03.672Z
Learning: Unit tests for key length enforcement in both `EncryptCookie` and `DecryptCookie` functions have been added to ensure robust validation and prevent potential runtime errors.
Learnt from: gaby
PR: gofiber/fiber#3056
File: middleware/encryptcookie/utils.go:20-23
Timestamp: 2024-10-08T19:06:06.583Z
Learning: Unit tests for key length enforcement in both `EncryptCookie` and `DecryptCookie` functions have been added to ensure robust validation and prevent potential runtime errors.
docs/whats_new.md (8)

Learnt from: ReneWerner87
PR: #3161
File: app.go:923-932
Timestamp: 2024-11-15T07:56:21.623Z
Learning: In the Fiber framework, breaking changes are acceptable when moving from version 2 to version 3, including modifications to method signatures such as in the Test method in app.go.

Learnt from: sixcolors
PR: #3446
File: docs/middleware/logger.md:44-44
Timestamp: 2025-05-13T00:19:16.407Z
Learning: In documentation files for the Fiber framework, code examples are often partial and don't repeat import statements that were shown in earlier examples, focusing instead on demonstrating specific usage patterns.

Learnt from: ckoch786
PR: #3230
File: docs/whats_new.md:944-951
Timestamp: 2024-12-15T19:56:45.935Z
Learning: Detailed usage examples and explanations for new methods like RemoveRoute and RemoveRouteByName are documented in docs/api/app.md, so it's unnecessary to duplicate them in docs/whats_new.md.

Learnt from: sixcolors
PR: #3598
File: docs/middleware/csrf.md:37-42
Timestamp: 2025-07-19T14:06:29.884Z
Learning: In Fiber v3, the CookieSameSite constants use lowercase values: CookieSameSiteLaxMode = "lax", CookieSameSiteStrictMode = "strict", CookieSameSiteNoneMode = "none". Documentation examples should use lowercase string values or the typed constants, not capitalized strings like "Lax".

Learnt from: hcancelik
PR: #3036
File: docs/middleware/cache.md:103-103
Timestamp: 2024-06-15T19:26:06.401Z
Learning: There are no hard tabs in the lines 100 to 105 of the docs/middleware/cache.md file. Future comments about formatting should accurately reflect the actual content.

Learnt from: hcancelik
PR: #3036
File: docs/middleware/cache.md:103-103
Timestamp: 2024-10-08T19:06:06.583Z
Learning: There are no hard tabs in the lines 100 to 105 of the docs/middleware/cache.md file. Future comments about formatting should accurately reflect the actual content.

Learnt from: gaby
PR: #3056
File: middleware/encryptcookie/utils.go:20-23
Timestamp: 2024-07-01T03:44:03.672Z
Learning: Unit tests for key length enforcement in both EncryptCookie and DecryptCookie functions have been added to ensure robust validation and prevent potential runtime errors.

Learnt from: gaby
PR: #3056
File: middleware/encryptcookie/utils.go:20-23
Timestamp: 2024-10-08T19:06:06.583Z
Learning: Unit tests for key length enforcement in both EncryptCookie and DecryptCookie functions have been added to ensure robust validation and prevent potential runtime errors.

docs/middleware/basicauth.md (6)

Learnt from: hcancelik
PR: #3036
File: docs/middleware/cache.md:103-103
Timestamp: 2024-10-08T19:06:06.583Z
Learning: There are no hard tabs in the lines 100 to 105 of the docs/middleware/cache.md file. Future comments about formatting should accurately reflect the actual content.

Learnt from: hcancelik
PR: #3036
File: docs/middleware/cache.md:103-103
Timestamp: 2024-06-15T19:26:06.401Z
Learning: There are no hard tabs in the lines 100 to 105 of the docs/middleware/cache.md file. Future comments about formatting should accurately reflect the actual content.

Learnt from: ckoch786
PR: #3230
File: docs/whats_new.md:944-951
Timestamp: 2024-12-15T19:56:45.935Z
Learning: Detailed usage examples and explanations for new methods like RemoveRoute and RemoveRouteByName are documented in docs/api/app.md, so it's unnecessary to duplicate them in docs/whats_new.md.

Learnt from: mdelapenya
PR: #3434
File: docs/api/services.md:39-43
Timestamp: 2025-05-07T13:07:33.899Z
Learning: When documenting Go interface methods in the Fiber project, avoid showing method signatures with the interface type as the receiver (e.g., func (d *Service) Method()) since interfaces cannot be used as receivers in Go. Instead, show just the method signature without a receiver or use a placeholder implementation name.

Learnt from: sixcolors
PR: #3016
File: middleware/csrf/csrf_test.go:188-193
Timestamp: 2024-10-08T19:06:06.583Z
Learning: In the Fiber framework tests, using ctx.Response.Header.Cookie may not be suitable for parsing cookies from the response header, as it requires a *Cookie and fills it rather than returning a string value; thus, manual parsing of the Set-Cookie header may be necessary.

Learnt from: sixcolors
PR: #3016
File: middleware/csrf/csrf_test.go:188-193
Timestamp: 2024-09-25T15:57:10.221Z
Learning: In the Fiber framework tests, using ctx.Response.Header.Cookie may not be suitable for parsing cookies from the response header, as it requires a *Cookie and fills it rather than returning a string value; thus, manual parsing of the Set-Cookie header may be necessary.

⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (5)
  • GitHub Check: repeated
  • GitHub Check: unit (1.24.x, windows-latest)
  • GitHub Check: unit (1.24.x, macos-13)
  • GitHub Check: Compare
  • GitHub Check: Analyse

Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Performance Alert ⚠️

Possible performance regression was detected for benchmark.
Benchmark result of this commit is worse than the previous benchmark result exceeding threshold 1.50.

Benchmark suite Current: 15ccbcf Previous: 2e544ae Ratio
Benchmark_Ctx_Links - B/op 1 B/op 0 B/op +∞

This comment was automatically generated by workflow using github-action-benchmark.

@ReneWerner87 ReneWerner87 merged commit c309d46 into main Jul 30, 2025
15 checks passed
@ReneWerner87 ReneWerner87 deleted the 2025-07-30-13-21-18 branch July 30, 2025 13:58
@github-project-automation github-project-automation bot moved this from In Progress to Done in v3 Jul 30, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

2 participants