summaryrefslogtreecommitdiff
path: root/servconf.h
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2018-07-03 10:59:35 +0000
committerDamien Miller <djm@mindrot.org>2018-07-03 21:01:30 +1000
commit95344c257412b51199ead18d54eaed5bafb75617 (patch)
tree320a21db8781ca4f6a363db928ca04b3b0d1dd70 /servconf.h
parent6f56fe4b9578b0627667f8bce69d4d938a88324c (diff)
upstream: allow sshd_config PermitUserEnvironment to accept a
pattern-list of whitelisted environment variable names in addition to yes|no. bz#1800, feedback and ok markus@ OpenBSD-Commit-ID: 77dc2b468e0bf04b53f333434ba257008a1fdf24
Diffstat (limited to 'servconf.h')
-rw-r--r--servconf.h4
1 files changed, 3 insertions, 1 deletions
diff --git a/servconf.h b/servconf.h
index db8362c60..73327135b 100644
--- a/servconf.h
+++ b/servconf.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: servconf.h,v 1.134 2018/06/09 03:03:10 djm Exp $ */ 1/* $OpenBSD: servconf.h,v 1.135 2018/07/03 10:59:35 djm Exp $ */
2 2
3/* 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -133,6 +133,7 @@ typedef struct {
133 int permit_empty_passwd; /* If false, do not permit empty 133 int permit_empty_passwd; /* If false, do not permit empty
134 * passwords. */ 134 * passwords. */
135 int permit_user_env; /* If true, read ~/.ssh/environment */ 135 int permit_user_env; /* If true, read ~/.ssh/environment */
136 char *permit_user_env_whitelist; /* pattern-list whitelist */
136 int compression; /* If true, compression is allowed */ 137 int compression; /* If true, compression is allowed */
137 int allow_tcp_forwarding; /* One of FORWARD_* */ 138 int allow_tcp_forwarding; /* One of FORWARD_* */
138 int allow_streamlocal_forwarding; /* One of FORWARD_* */ 139 int allow_streamlocal_forwarding; /* One of FORWARD_* */
@@ -242,6 +243,7 @@ struct connection_info {
242 M_CP_STROPT(hostbased_key_types); \ 243 M_CP_STROPT(hostbased_key_types); \
243 M_CP_STROPT(pubkey_key_types); \ 244 M_CP_STROPT(pubkey_key_types); \
244 M_CP_STROPT(routing_domain); \ 245 M_CP_STROPT(routing_domain); \
246 M_CP_STROPT(permit_user_env_whitelist); \
245 M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \ 247 M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \
246 M_CP_STRARRAYOPT(allow_users, num_allow_users); \ 248 M_CP_STRARRAYOPT(allow_users, num_allow_users); \
247 M_CP_STRARRAYOPT(deny_users, num_deny_users); \ 249 M_CP_STRARRAYOPT(deny_users, num_deny_users); \