Create AuthorizedKeysCommand#5236
Conversation
0a044a7 to
6e94f2b
Compare
6e94f2b to
7504f81
Compare
techknowlogick
left a comment
There was a problem hiding this comment.
One nit, Can you add setting to custom/conf/app.ini.sample
|
@techknowlogick you mean add the Hmm. I think if it's going to go in to the suggested |
|
That’s correct. Your idea of no double negatives is a good one.
|
8b8df05 to
9e87637
Compare
|
Sorry I just noticed that XORM was reporting stuff on stdout that would conflict with the authorized_keys standard so adjusted the code. |
9b9f428 to
256508a
Compare
256508a to
4b41181
Compare
Codecov Report
@@ Coverage Diff @@
## master #5236 +/- ##
==========================================
- Coverage 37.62% 37.61% -0.01%
==========================================
Files 310 310
Lines 46039 46040 +1
==========================================
- Hits 17320 17319 -1
- Misses 26240 26242 +2
Partials 2479 2479
Continue to review full report at Codecov.
|
|
I guess this request partially closes #1870? |
|
Don't mind I have understand. Sorry. |
| return err | ||
| } | ||
|
|
||
| publicKey, err := models.SearchPublicKeyByContent(content) |
There was a problem hiding this comment.
This should use internal api not models directly
There was a problem hiding this comment.
That would have been a good spot >1 year ago... I guess we need to pop a bug fix up...
There was a problem hiding this comment.
It just popped up in notifications 😅
This pull-request adds a subcommand that can be used as an SSH AuthorizedKeysCommand.
The configuration is described in command-line.md.