1. 07 Aug, 2018 1 commit
  2. 30 Jul, 2018 1 commit
  3. 11 Jul, 2018 1 commit
  4. 09 Jul, 2018 1 commit
  5. 06 Jul, 2018 1 commit
  6. 05 Jul, 2018 1 commit
  7. 20 Jun, 2018 1 commit
  8. 02 May, 2018 1 commit
  9. 06 Apr, 2018 1 commit
  10. 26 Mar, 2018 1 commit
  11. 16 Mar, 2018 1 commit
  12. 01 Mar, 2018 1 commit
  13. 15 Feb, 2018 1 commit
  14. 07 Feb, 2018 1 commit
  15. 15 Jan, 2018 1 commit
  16. 04 Jan, 2018 1 commit
  17. 01 Jan, 2018 1 commit
  18. 22 Dec, 2017 1 commit
  19. 23 Nov, 2017 1 commit
  20. 30 Oct, 2017 1 commit
  21. 24 Oct, 2017 1 commit
  22. 20 Oct, 2017 1 commit
  23. 07 Oct, 2017 1 commit
    • Jacopo's avatar
      Replaces `tag: true` into `:tag` in the specs · 0ce67858
      Jacopo authored
      Replaces all the explicit include metadata syntax in the specs (tag:
      true) into the implicit one (:tag).
      Added a cop to prevent future errors and handle autocorrection.
      0ce67858
  24. 05 Oct, 2017 1 commit
  25. 23 Sep, 2017 5 commits
  26. 16 Sep, 2017 1 commit
  27. 13 Sep, 2017 1 commit
  28. 10 Sep, 2017 1 commit
  29. 05 Sep, 2017 1 commit
  30. 01 Sep, 2017 1 commit
  31. 30 Aug, 2017 2 commits
    • Nick Thomas's avatar
      Rework the permissions model for SSH key restrictions · 68470602
      Nick Thomas authored
      `allowed_key_types` is removed and the `minimum_<type>_bits` fields are
      renamed to `<tech>_key_restriction`. A special sentinel value (`-1`) signifies
      that the key type is disabled.
      
      This also feeds through to the UI - checkboxes per key type are out, inline
      selection of "forbidden" and "allowed" (i.e., no restrictions) are in.
      
      As with the previous model, unknown key types are disallowed, even if the
      underlying ssh daemon happens to support them. The defaults have also been
      changed from the lowest known bit size to "no restriction". So if someone
      does happen to have a 768-bit RSA key, it will continue to work on upgrade, at
      least until the administrator restricts them.
      68470602
    • Nick Thomas's avatar
      Add settings for minimum key strength and allowed key type · b0f982fb
      Nick Thomas authored
      This is an amalgamation of:
      
      * Cory Hinshaw: Initial implementation !5552
      * Rémy Coutable: Updates !9350
      * Nick Thomas: Resolve conflicts and add ED25519 support !13712
      b0f982fb
  32. 29 Aug, 2017 1 commit
  33. 11 Aug, 2017 1 commit
  34. 10 Aug, 2017 1 commit
  35. 08 Aug, 2017 1 commit