diff options
author | djm@openbsd.org <djm@openbsd.org> | 2015-05-21 06:43:30 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2015-05-21 16:45:46 +1000 |
commit | bcc50d816187fa9a03907ac1f3a52f04a52e10d1 (patch) | |
tree | 7fee32fe8c063a24674a37aad34e4b381d995ae5 /servconf.h | |
parent | 24232a3e5ab467678a86aa67968bbb915caffed4 (diff) |
upstream commit
add AuthorizedPrincipalsCommand that allows getting
authorized_principals from a subprocess rather than a file, which is quite
useful in deployments with large userbases
feedback and ok markus@
Upstream-ID: aa1bdac7b16fc6d2fa3524ef08f04c7258d247f6
Diffstat (limited to 'servconf.h')
-rw-r--r-- | servconf.h | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/servconf.h b/servconf.h index 38520f476..dc2a5f6a6 100644 --- a/servconf.h +++ b/servconf.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: servconf.h,v 1.117 2015/04/29 03:48:56 dtucker Exp $ */ | 1 | /* $OpenBSD: servconf.h,v 1.118 2015/05/21 06:43:31 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -178,9 +178,11 @@ typedef struct { | |||
178 | char *chroot_directory; | 178 | char *chroot_directory; |
179 | char *revoked_keys_file; | 179 | char *revoked_keys_file; |
180 | char *trusted_user_ca_keys; | 180 | char *trusted_user_ca_keys; |
181 | char *authorized_principals_file; | ||
182 | char *authorized_keys_command; | 181 | char *authorized_keys_command; |
183 | char *authorized_keys_command_user; | 182 | char *authorized_keys_command_user; |
183 | char *authorized_principals_file; | ||
184 | char *authorized_principals_command; | ||
185 | char *authorized_principals_command_user; | ||
184 | 186 | ||
185 | int64_t rekey_limit; | 187 | int64_t rekey_limit; |
186 | int rekey_interval; | 188 | int rekey_interval; |
@@ -216,9 +218,11 @@ struct connection_info { | |||
216 | M_CP_STROPT(banner); \ | 218 | M_CP_STROPT(banner); \ |
217 | M_CP_STROPT(trusted_user_ca_keys); \ | 219 | M_CP_STROPT(trusted_user_ca_keys); \ |
218 | M_CP_STROPT(revoked_keys_file); \ | 220 | M_CP_STROPT(revoked_keys_file); \ |
219 | M_CP_STROPT(authorized_principals_file); \ | ||
220 | M_CP_STROPT(authorized_keys_command); \ | 221 | M_CP_STROPT(authorized_keys_command); \ |
221 | M_CP_STROPT(authorized_keys_command_user); \ | 222 | M_CP_STROPT(authorized_keys_command_user); \ |
223 | M_CP_STROPT(authorized_principals_file); \ | ||
224 | M_CP_STROPT(authorized_principals_command); \ | ||
225 | M_CP_STROPT(authorized_principals_command_user); \ | ||
222 | M_CP_STROPT(hostbased_key_types); \ | 226 | M_CP_STROPT(hostbased_key_types); \ |
223 | M_CP_STROPT(pubkey_key_types); \ | 227 | M_CP_STROPT(pubkey_key_types); \ |
224 | M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \ | 228 | M_CP_STRARRAYOPT(authorized_keys_files, num_authkeys_files); \ |