tailscale/ssh/tailssh
Maisem Ali 2a8de4a7ee ssh/tailssh: always use current time for policy evaluation
Whenever the SSH policy changes we revaluate all open connections to
make sure they still have access. This check was using the wrong
timestamp and would match against expired policies, however this really
isn't a problem today as we don't have policy that would be impacted by
this check. Fixing it for future use.

Signed-off-by: Maisem Ali <maisem@tailscale.com>
(cherry picked from commit c434e47f2d)
2022-07-05 09:56:51 -07:00
..
context.go all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
ctxreader.go ssh/tailssh: handle Control-C during hold-and-delegate prompt 2022-05-05 11:47:08 -07:00
incubator.go ssh/tailssh: limit setgroups to 16 on macOS 2022-07-05 09:56:51 -07:00
incubator_darwin.go ssh/tailssh: limit setgroups to 16 on macOS 2022-07-05 09:56:51 -07:00
incubator_linux.go ssh/tailssh: limit setgroups to 16 on macOS 2022-07-05 09:56:51 -07:00
tailssh.go ssh/tailssh: always use current time for policy evaluation 2022-07-05 09:56:51 -07:00
tailssh_test.go ssh/tailssh: always use current time for policy evaluation 2022-07-05 09:56:51 -07:00