summaryrefslogtreecommitdiff
path: root/servconf.h
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2015-05-21 06:43:30 +0000
committerDamien Miller <djm@mindrot.org>2015-05-21 16:45:46 +1000
commitbcc50d816187fa9a03907ac1f3a52f04a52e10d1 (patch)
tree7fee32fe8c063a24674a37aad34e4b381d995ae5 /servconf.h
parent24232a3e5ab467678a86aa67968bbb915caffed4 (diff)
upstream commit
add AuthorizedPrincipalsCommand that allows getting authorized_principals from a subprocess rather than a file, which is quite useful in deployments with large userbases feedback and ok markus@ Upstream-ID: aa1bdac7b16fc6d2fa3524ef08f04c7258d247f6
Diffstat (limited to 'servconf.h')
-rw-r--r--servconf.h10
1 files changed, 7 insertions, 3 deletions
diff --git a/servconf.h b/servconf.h
index 38520f476..dc2a5f6a6 100644
--- a/servconf.h
+++ b/servconf.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: servconf.h,v 1.117 2015/04/29 03:48:56 dtucker Exp $ */ 1/* $OpenBSD: servconf.h,v 1.118 2015/05/21 06:43:31 djm Exp $ */
2 2
3/* 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -178,9 +178,11 @@ typedef struct {
178 char *chroot_directory; 178 char *chroot_directory;
179 char *revoked_keys_file; 179 char *revoked_keys_file;
180 char *trusted_user_ca_keys; 180 char *trusted_user_ca_keys;
181 char *authorized_principals_file;
182 char *authorized_keys_command; 181 char *authorized_keys_command;
183 char *authorized_keys_command_user; 182 char *authorized_keys_command_user;
183 char *authorized_principals_file;
184 char *authorized_principals_command;
185 char *authorized_principals_command_user;
184 186
185 int64_t rekey_limit; 187 int64_t rekey_limit;
186 int rekey_interval; 188 int rekey_interval;
@@ -216,9 +218,11 @@ struct connection_info {
216 M_CP_STROPT(banner); \ 218 M_CP_STROPT(banner); \
217 M_CP_STROPT(trusted_user_ca_keys); \ 219 M_CP_STROPT(trusted_user_ca_keys); \
218 M_CP_STROPT(revoked_keys_file); \ 220 M_CP_STROPT(revoked_keys_file); \
219 M_CP_STROPT(authorized_principals_file); \
220 M_CP_STROPT(authorized_keys_command); \ 221 M_CP_STROPT(authorized_keys_command); \
221 M_CP_STROPT(authorized_keys_command_user); \ 222 M_CP_STROPT(authorized_keys_command_user); \
223 M_CP_STROPT(authorized_principals_file); \
224 M_CP_STROPT(authorized_principals_command); \
225 M_CP_STROPT(authorized_principals_command_user); \
222 M_CP_STROPT(hostbased_key_types); \ 226 M_CP_STROPT(hostbased_key_types); \
223 M_CP_STROPT(pubkey_key_types); \ 227 M_CP_STROPT(pubkey_key_types); \
224 M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \ 228 M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \