aboutsummaryrefslogtreecommitdiff
path: root/models/ssh_key.go
Commit message (Collapse)AuthorAge
* Refactoring: remove sessionRelease()Unknwon2017-06-11
| | | | XORM supports automatic roll back in session Close() already.
* pkg/process: fix potential race conditionUnknwon2017-06-11
| | | | | | Following conditions were not protected: 1. Use and increase next pid 2. Append and remove process from the list
* setting: disable SSH minimum key size check when not eligible (#4507)Unknwon2017-06-11
|
* models: remove redundant tags for primary keysUnknwon2017-05-21
|
* models/ssh_key: don't run ssh-keygen check if disabled (#4519)Gibheer2017-05-20
| | | | | | | | | | | | * don't load key when key size should not be checked This makes it possible for users with incompatible ssh-keygen versions to just disable the check completely without running into errors. * add proper ed25519 constant The x/crypto/ssh library has support for ed25519 now, so it is possible to support it.
* Refactoring: rename pkg/base -> pkg/toolUnknwon2017-04-05
|
* Refactoring: rename modules -> pkgUnknwon2017-04-04
| | | | | | | | Reasons to change: 1. Shorter than 'modules' 2. More generally used by other Go projects 3. Corresponds to the naming of '$GOPATH/pkg' directory
* ssh_key: create parent directory of 'authorized_keys' fileUnknwon2017-03-08
|
* models/access: hasAccess only need userID not user objectUnknwon2017-02-23
|
* models/ssh_key: fix SSH_KEYGEN_PATH not working (#3770)Unknwon2017-02-10
|
* log: start using gopkg.in/clog.v1Unknwon2017-02-09
|
* models/ssh_key: little key methods receiver renameUnknwon2017-02-01
|
* cmd/serve: minor code improve for PR #4078Unknwon2017-02-01
|
* #3480 Fix new ssh key adding issues (#3565)Najeeb R2016-12-21
| | | | | | | | | | | * #3480 Fix new ssh key adding issues Added regular exp match (108) and remove training new line (111) that cause system to think its an ssh2 key. * #3480 Fix new ssh key adding issues -Sanitizate new lines (windows format) in posted key -Edit sanitization implementation to use string replace for code readability and maintenability.
* #3281 fix x.Iterate returns nothing inside session scope with SQLite3Unknwon2016-07-26
|
* models/ssh_key: code cleaningUnknwon2016-07-26
|
* Refactor User.Id to User.IDUnknwon2016-07-24
|
* Remove redundant Unix timestamp method callUnknwon2016-07-23
| | | | Unix() already uses UTC as timezone
* #2302 Replace time.Time with Unix Timestamp (int64)Unknwon2016-03-09
|
* Post work for #2637Unknwon2016-02-27
| | | | Improve test cases, config settings, also show SSH config settings on admin config panel.
* variable should not use ALL_CAPSGibheer2016-02-23
|
* allow native and ssh-keygen public key checkGibheer2016-02-16
| | | | | | | | | | | | | | | | | | | This commit adds the possibibility to use either the native golang libraries or ssh-keygen to check public keys. The check is adjusted depending on the settings, so that only supported keys are let through. This commit also brings back the blacklist feature, which was removed in 7ef9a055886574655d9f2be70c957bc16bf30500. This allows to blacklist algorythms or keys based on the key length. This works with the native and the ssh-keygen way. Because of #2179 it also includes a way to adjust the path to ssh-keygen and the working directory for ssh-keygen. With this, sysadmins should be able to adjust the settings in a way, that SELinux is okay with it. In the worst case, they can switch to the native implementation and only loose support for ed25519 keys at the moment. There are some other places which need adjustment to utilize the parameters and the native implementation, but this sets the ground work.
* Trim whitespace when adding SSH keys (fixes #2447)John Maguire2016-01-31
|
* Add debug log when SSH key for deletion isn't foundJohn Maguire2016-01-31
|
* #2179 use Go sub-repo ssh to verify public key contentUnknwon2016-01-15
|
* fix #1436Unknwon2015-12-19
|
* #2147 fix rewrites authorized_keys when builtin SSH server is enabledUnknwon2015-12-11