projects
/
mirror
/
userdir-ldap.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Authorize ed25519 keys, which have a fixed size of 256 bits
[mirror/userdir-ldap.git]
/
ud-mailgate
diff --git
a/ud-mailgate
b/ud-mailgate
index
05756aa
..
aaf1e2a
100755
(executable)
--- a/
ud-mailgate
+++ b/
ud-mailgate
@@
-323,7
+323,7
@@
def DoSSH(Str, Attrs, badkeys, uid):
Match = SSHFingerprint.match(output)
g = Match.groups()
Match = SSHFingerprint.match(output)
g = Match.groups()
- if int(g[0]) < 1024:
+ if int(g[0]) < 1024
and (typekey != "ed25519")
:
try:
# Body
Subst["__ERROR__"] = "SSH keysize %s is below limit 1024" % (g[0])
try:
# Body
Subst["__ERROR__"] = "SSH keysize %s is below limit 1024" % (g[0])
@@
-490,7
+490,7
@@
def DoRBL(Str,Attrs):
# Handle a ConfirmSudoPassword request
def DoConfirmSudopassword(Str, SudoPasswd):
# Handle a ConfirmSudoPassword request
def DoConfirmSudopassword(Str, SudoPasswd):
- Match = re.compile('^confirm sudopassword ('+UUID_FORMAT+') ([a-z0-9.,*]+) ([0-9a-f]{40})$').match(Str)
+ Match = re.compile('^confirm sudopassword ('+UUID_FORMAT+') ([a-z0-9.,*
-
]+) ([0-9a-f]{40})$').match(Str)
if Match == None:
return None
if Match == None:
return None
@@
-517,7
+517,7
@@
def FinishConfirmSudopassword(l, uid, Attrs, SudoPasswd):
newldap = []
for entry in inldap:
newldap = []
for entry in inldap:
- Match = re.compile('^('+UUID_FORMAT+') (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*]+) ([^ ]+)$').match(entry)
+ Match = re.compile('^('+UUID_FORMAT+') (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*
-
]+) ([^ ]+)$').match(entry)
if Match == None:
raise UDFormatError, "Could not parse existing sudopasswd entry"
uuid = Match.group(1)
if Match == None:
raise UDFormatError, "Could not parse existing sudopasswd entry"
uuid = Match.group(1)