Add the possibility to save mtn public keys per user

* src/IDF/Key.php: new column "type" which is either "ssh" or "mtn";
  utility functions to query the mtn key name and id as well as
  all available key types for the current IDF installation
* src/IDF/Migrations/16KeyType.php: needed migration script
* src/IDF/Plugin/SyncGit/Cron.php: ensure only SSH keys are handled
* adapt forms and templates accordingly
master
Thomas Keller 2010-08-11 23:48:09 +02:00
parent ce436cc6ec
commit e47d51d14c
8 changed files with 274 additions and 71 deletions

View File

@ -77,21 +77,27 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
'initial' => '', 'initial' => '',
'widget' => 'Pluf_Form_Widget_SelectInput', 'widget' => 'Pluf_Form_Widget_SelectInput',
'widget_attrs' => array( 'widget_attrs' => array(
'choices' => 'choices' =>
Pluf_L10n::getInstalledLanguages() Pluf_L10n::getInstalledLanguages()
), ),
)); ));
$this->fields['ssh_key'] = new Pluf_Form_Field_Varchar( $this->fields['public_key'] = new Pluf_Form_Field_Varchar(
array('required' => false, array('required' => false,
'label' => __('Add a public SSH key'), 'label' => __('Add a public key'),
'initial' => '', 'initial' => '',
'widget_attrs' => array('rows' => 3, 'widget_attrs' => array('rows' => 3,
'cols' => 40), 'cols' => 40),
'widget' => 'Pluf_Form_Widget_TextareaInput', 'widget' => 'Pluf_Form_Widget_TextareaInput',
'help_text' => __('Be careful to provide the public key and not the private key!') 'help_text' => __('Be careful to provide the public key and not the private key!')
)); ));
$this->fields['public_key_type'] = new Pluf_Form_Field_Varchar(
array('required' => true,
'label' => __('Key type'),
'initial' => 'ssh',
'widget_attrs' => array('choices' => IDF_Key::getAvailableKeyTypes()),
'widget' => 'Pluf_Form_Widget_SelectInput',
));
} }
@ -138,10 +144,11 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
Pluf_Signal::send('Pluf_User::passwordUpdated', Pluf_Signal::send('Pluf_User::passwordUpdated',
'IDF_Form_Admin_UserCreate', $params); 'IDF_Form_Admin_UserCreate', $params);
// Create the ssh key as needed // Create the ssh key as needed
if ('' !== $this->cleaned_data['ssh_key']) { if ('' !== $this->cleaned_data['public_key']) {
$key = new IDF_Key(); $key = new IDF_Key();
$key->user = $user; $key->user = $user;
$key->content = $this->cleaned_data['ssh_key']; $key->content = $this->cleaned_data['public_key'];
$key->type = $this->cleaned_data['public_key_type'];
$key->create(); $key->create();
} }
// Send an email to the user with the password // Send an email to the user with the password
@ -162,16 +169,11 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
return $user; return $user;
} }
function clean_ssh_key()
{
return IDF_Form_UserAccount::checkSshKey($this->cleaned_data['ssh_key']);
}
function clean_last_name() function clean_last_name()
{ {
$last_name = trim($this->cleaned_data['last_name']); $last_name = trim($this->cleaned_data['last_name']);
if ($last_name == mb_strtoupper($last_name)) { if ($last_name == mb_strtoupper($last_name)) {
return mb_convert_case(mb_strtolower($last_name), return mb_convert_case(mb_strtolower($last_name),
MB_CASE_TITLE, 'UTF-8'); MB_CASE_TITLE, 'UTF-8');
} }
return $last_name; return $last_name;
@ -181,7 +183,7 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
{ {
$first_name = trim($this->cleaned_data['first_name']); $first_name = trim($this->cleaned_data['first_name']);
if ($first_name == mb_strtoupper($first_name)) { if ($first_name == mb_strtoupper($first_name)) {
return mb_convert_case(mb_strtolower($first_name), return mb_convert_case(mb_strtolower($first_name),
MB_CASE_TITLE, 'UTF-8'); MB_CASE_TITLE, 'UTF-8');
} }
return $first_name; return $first_name;
@ -211,4 +213,16 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
} }
return $this->cleaned_data['login']; return $this->cleaned_data['login'];
} }
/**
* Checks whether any given public key is valid
*/
public function clean()
{
$this->cleaned_data['public_key'] =
IDF_Form_UserAccount::checkPublicKey($this->cleaned_data['public_key'],
$this->cleaned_data['public_key_type']);
return $this->cleaned_data;
}
} }

View File

@ -65,7 +65,7 @@ class IDF_Form_UserAccount extends Pluf_Form
'initial' => $this->user->language, 'initial' => $this->user->language,
'widget' => 'Pluf_Form_Widget_SelectInput', 'widget' => 'Pluf_Form_Widget_SelectInput',
'widget_attrs' => array( 'widget_attrs' => array(
'choices' => 'choices' =>
Pluf_L10n::getInstalledLanguages() Pluf_L10n::getInstalledLanguages()
), ),
)); ));
@ -92,16 +92,22 @@ class IDF_Form_UserAccount extends Pluf_Form
), ),
)); ));
$this->fields['ssh_key'] = new Pluf_Form_Field_Varchar( $this->fields['public_key'] = new Pluf_Form_Field_Varchar(
array('required' => false, array('required' => false,
'label' => __('Add a public SSH key'), 'label' => __('Add a public key'),
'initial' => '', 'initial' => '',
'widget_attrs' => array('rows' => 3, 'widget_attrs' => array('rows' => 3,
'cols' => 40), 'cols' => 40),
'widget' => 'Pluf_Form_Widget_TextareaInput', 'widget' => 'Pluf_Form_Widget_TextareaInput',
'help_text' => __('Be careful to provide your public key and not your private key!') 'help_text' => __('Be careful to provide your public key and not your private key!')
)); ));
$this->fields['public_key_type'] = new Pluf_Form_Field_Varchar(
array('required' => true,
'label' => __('Key type'),
'initial' => 'ssh',
'widget_attrs' => array('choices' => IDF_Key::getAvailableKeyTypes()),
'widget' => 'Pluf_Form_Widget_SelectInput',
));
} }
@ -151,10 +157,11 @@ class IDF_Form_UserAccount extends Pluf_Form
} }
$this->user->setFromFormData($this->cleaned_data); $this->user->setFromFormData($this->cleaned_data);
// Add key as needed. // Add key as needed.
if ('' !== $this->cleaned_data['ssh_key']) { if ('' !== $this->cleaned_data['public_key']) {
$key = new IDF_Key(); $key = new IDF_Key();
$key->user = $this->user; $key->user = $this->user;
$key->content = $this->cleaned_data['ssh_key']; $key->content = $this->cleaned_data['public_key'];
$key->type = $this->cleaned_data['public_key_type'];
if ($commit) { if ($commit) {
$key->create(); $key->create();
} }
@ -190,61 +197,111 @@ class IDF_Form_UserAccount extends Pluf_Form
} }
/** /**
* Check an ssh key. * Check arbitrary public keys.
* *
* It will throw a Pluf_Form_Invalid exception if it cannot * It will throw a Pluf_Form_Invalid exception if it cannot
* validate the key. * validate the key.
* *
* @param $key string The key * @param $key string The key
* @param $key string The type ('ssh' or 'mtn')
* @param $user int The user id of the user of the key (0) * @param $user int The user id of the user of the key (0)
* @return string The clean key * @return string The clean key
*/ */
public static function checkSshKey($key, $user=0) public static function checkPublicKey($key, $type, $user=0)
{ {
$key = trim($key); $key = trim($key);
if (strlen($key) == 0) { if (strlen($key) == 0)
{
return ''; return '';
} }
$key = str_replace(array("\n", "\r"), '', $key);
if (!preg_match('#^ssh\-[a-z]{3}\s(\S+)\s\S+$#', $key, $matches)) { if ($type == 'ssh')
throw new Pluf_Form_Invalid(__('The format of the key is not valid. It must start with ssh-dss or ssh-rsa, a long string on a single line and at the end a comment.')); {
} $key = str_replace(array("\n", "\r"), '', $key);
if (Pluf::f('idf_strong_key_check', false)) { if (!preg_match('#^ssh\-[a-z]{3}\s\S+\s\S+$#', $key))
$tmpfile = Pluf::f('tmp_folder', '/tmp').'/'.$user.'-key'; {
file_put_contents($tmpfile, $key, LOCK_EX); throw new Pluf_Form_Invalid(
$cmd = Pluf::f('idf_exec_cmd_prefix', ''). __('The format of the key is not valid. It must start '.
'ssh-keygen -l -f '.escapeshellarg($tmpfile).' > /dev/null 2>&1'; 'with ssh-dss or ssh-rsa, a long string on a single '.
exec($cmd, $out, $return); 'line and at the end a comment.')
unlink($tmpfile); );
if ($return != 0) { }
throw new Pluf_Form_Invalid(__('Please check the key as it does not appears to be a valid key.')); if (Pluf::f('idf_strong_key_check', false))
{
$tmpfile = Pluf::f('tmp_folder', '/tmp').'/'.$user.'-key';
file_put_contents($tmpfile, $key, LOCK_EX);
$cmd = Pluf::f('idf_exec_cmd_prefix', '').
'ssh-keygen -l -f '.escapeshellarg($tmpfile).' > /dev/null 2>&1';
exec($cmd, $out, $return);
unlink($tmpfile);
if ($return != 0)
{
throw new Pluf_Form_Invalid(
__('Please check the key as it does not appears '.
'to be a valid key.')
);
}
} }
} }
else if ($type == 'mtn')
{
if (!preg_match('#^\[pubkey [^\]]+\]\s*\S+\s*\[end\]$#', $key))
{
throw new Pluf_Form_Invalid(
__('The format of the key is not valid. It must start '.
'with [pubkey KEYNAME], contain a long string on a single '.
'line and end with [end] in the final third line.')
);
}
if (Pluf::f('idf_strong_key_check', false))
{
// if monotone can read it, it should be valid
$mtn_opts = implode(' ', Pluf::f('mtn_opts', array()));
$cmd = Pluf::f('idf_exec_cmd_prefix', '').
sprintf('%s %s -d :memory: read >/tmp/php-out 2>&1',
Pluf::f('mtn_path', 'mtn'), $mtn_opts);
$fp = popen($cmd, 'w');
fwrite($fp, $key);
$return = pclose($fp);
if ($return != 0)
{
throw new Pluf_Form_Invalid(
__('Please check the key as it does not appears '.
'to be a valid key.')
);
}
}
}
else
{
throw new Pluf_Form_Invalid(__('Unknown key type'));
}
// If $user, then check if not the same key stored // If $user, then check if not the same key stored
if ($user) { if ($user)
{
$ruser = Pluf::factory('Pluf_User', $user); $ruser = Pluf::factory('Pluf_User', $user);
if ($ruser->id > 0) { if ($ruser->id > 0)
$sql = new Pluf_SQL('content=%s', array($key)); {
$sql = new Pluf_SQL('content=%s AND type=%s', array($key, $type));
$keys = Pluf::factory('IDF_Key')->getList(array('filter' => $sql->gen())); $keys = Pluf::factory('IDF_Key')->getList(array('filter' => $sql->gen()));
if (count($keys) > 0) { if (count($keys) > 0)
throw new Pluf_Form_Invalid(__('You already have uploaded this SSH key.')); {
throw new Pluf_Form_Invalid(
__('You already have uploaded this key.')
);
} }
} }
} }
return $key; return $key;
} }
function clean_ssh_key()
{
return self::checkSshKey($this->cleaned_data['ssh_key'],
$this->user->id);
}
function clean_last_name() function clean_last_name()
{ {
$last_name = trim($this->cleaned_data['last_name']); $last_name = trim($this->cleaned_data['last_name']);
if ($last_name == mb_strtoupper($last_name)) { if ($last_name == mb_strtoupper($last_name)) {
return mb_convert_case(mb_strtolower($last_name), return mb_convert_case(mb_strtolower($last_name),
MB_CASE_TITLE, 'UTF-8'); MB_CASE_TITLE, 'UTF-8');
} }
return $last_name; return $last_name;
@ -254,7 +311,7 @@ class IDF_Form_UserAccount extends Pluf_Form
{ {
$first_name = trim($this->cleaned_data['first_name']); $first_name = trim($this->cleaned_data['first_name']);
if ($first_name == mb_strtoupper($first_name)) { if ($first_name == mb_strtoupper($first_name)) {
return mb_convert_case(mb_strtolower($first_name), return mb_convert_case(mb_strtolower($first_name),
MB_CASE_TITLE, 'UTF-8'); MB_CASE_TITLE, 'UTF-8');
} }
return $first_name; return $first_name;
@ -264,7 +321,7 @@ class IDF_Form_UserAccount extends Pluf_Form
{ {
$this->cleaned_data['email'] = mb_strtolower(trim($this->cleaned_data['email'])); $this->cleaned_data['email'] = mb_strtolower(trim($this->cleaned_data['email']));
$guser = new Pluf_User(); $guser = new Pluf_User();
$sql = new Pluf_SQL('email=%s AND id!=%s', $sql = new Pluf_SQL('email=%s AND id!=%s',
array($this->cleaned_data['email'], $this->user->id)); array($this->cleaned_data['email'], $this->user->id));
if ($guser->getCount(array('filter' => $sql->gen())) > 0) { if ($guser->getCount(array('filter' => $sql->gen())) > 0) {
throw new Pluf_Form_Invalid(sprintf(__('The email "%s" is already used.'), $this->cleaned_data['email'])); throw new Pluf_Form_Invalid(sprintf(__('The email "%s" is already used.'), $this->cleaned_data['email']));
@ -273,11 +330,12 @@ class IDF_Form_UserAccount extends Pluf_Form
} }
/** /**
* Check to see if the 2 passwords are the same. * Check to see if the 2 passwords are the same and if any
* given public key is valid
*/ */
public function clean() public function clean()
{ {
if (!isset($this->errors['password']) if (!isset($this->errors['password'])
&& !isset($this->errors['password2'])) { && !isset($this->errors['password2'])) {
$password1 = $this->cleaned_data['password']; $password1 = $this->cleaned_data['password'];
$password2 = $this->cleaned_data['password2']; $password2 = $this->cleaned_data['password2'];
@ -285,6 +343,12 @@ class IDF_Form_UserAccount extends Pluf_Form
throw new Pluf_Form_Invalid(__('The passwords do not match. Please give them again.')); throw new Pluf_Form_Invalid(__('The passwords do not match. Please give them again.'));
} }
} }
$this->cleaned_data['public_key'] =
self::checkPublicKey($this->cleaned_data['public_key'],
$this->cleaned_data['public_key_type'],
$this->user->id);
return $this->cleaned_data; return $this->cleaned_data;
} }
} }

View File

@ -22,7 +22,7 @@
# ***** END LICENSE BLOCK ***** */ # ***** END LICENSE BLOCK ***** */
/** /**
* Storage of the SSH keys. * Storage of the public keys (ssh or monotone).
* *
*/ */
class IDF_Key extends Pluf_Model class IDF_Key extends Pluf_Model
@ -39,9 +39,9 @@ class IDF_Key extends Pluf_Model
array( array(
'type' => 'Pluf_DB_Field_Sequence', 'type' => 'Pluf_DB_Field_Sequence',
//It is automatically added. //It is automatically added.
'blank' => true, 'blank' => true,
), ),
'user' => 'user' =>
array( array(
'type' => 'Pluf_DB_Field_Foreignkey', 'type' => 'Pluf_DB_Field_Foreignkey',
'model' => 'Pluf_User', 'model' => 'Pluf_User',
@ -52,14 +52,21 @@ class IDF_Key extends Pluf_Model
array( array(
'type' => 'Pluf_DB_Field_Text', 'type' => 'Pluf_DB_Field_Text',
'blank' => false, 'blank' => false,
'verbose' => __('ssh key'), 'verbose' => __('public key'),
),
'type' =>
array(
'type' => 'Pluf_DB_Field_Varchar',
'size' => 3,
'blank' => false,
'verbose' => __('key type'),
), ),
); );
// WARNING: Not using getSqlTable on the Pluf_User object to // WARNING: Not using getSqlTable on the Pluf_User object to
// avoid recursion. // avoid recursion.
$t_users = $this->_con->pfx.'users'; $t_users = $this->_con->pfx.'users';
$this->_a['views'] = array( $this->_a['views'] = array(
'join_user' => 'join_user' =>
array( array(
'join' => 'LEFT JOIN '.$t_users 'join' => 'LEFT JOIN '.$t_users
.' ON '.$t_users.'.id='.$this->_con->qn('user'), .' ON '.$t_users.'.id='.$this->_con->qn('user'),
@ -75,6 +82,46 @@ class IDF_Key extends Pluf_Model
return Pluf_Template::markSafe(Pluf_esc(substr($this->content, 0, 25)).' [...] '.Pluf_esc(substr($this->content, -55))); return Pluf_Template::markSafe(Pluf_esc(substr($this->content, 0, 25)).' [...] '.Pluf_esc(substr($this->content, -55)));
} }
private function parseMonotoneKeyData()
{
if ($this->type != "mtn")
throw new IDF_Exception("key is not a monotone key type");
preg_match("#^\[pubkey ([^\]]+)\]\s*(\S+)\s*\[end\]$#", $this->content, $m);
if (count($m) != 3)
throw new IDF_Exception("invalid key data detected");
return array($m[1], $m[2]);
}
/**
* Returns the key name of the key, i.e. most of the time the email
* address, which not neccessarily has to be unique across a project.
*
* @return string
*/
function getMonotoneKeyName()
{
list($keyName, ) = $this->parseMonotoneKeyData();
return $keyName;
}
/**
* This function should be used to calculate the key id from the
* public key hash for authentication purposes. This avoids clashes
* in case the key name is not unique across the project
*
* And yes, this is actually how monotone itself calculates the key
* id...
*
* @return string
*/
function getMonotoneKeyId()
{
list($keyName, $keyData) = $this->parseMonotoneKeyData();
return sha1($keyName.":".$keyData);
}
function postSave($create=false) function postSave($create=false)
{ {
/** /**
@ -89,7 +136,7 @@ class IDF_Key extends Pluf_Model
* [description] * [description]
* *
* This signal allows an application to perform special * This signal allows an application to perform special
* operations after the saving of a SSH Key. * operations after the saving of a public Key.
* *
* [parameters] * [parameters]
* *
@ -128,4 +175,19 @@ class IDF_Key extends Pluf_Model
'IDF_Key', $params); 'IDF_Key', $params);
} }
/**
* Returns an associative array with available key types for this
* idf installation, ready for consumption for a <select> widget
*
* @return array
*/
public static function getAvailableKeyTypes()
{
$key_types = array(__("SSH") => 'ssh');
if (array_key_exists('mtn', Pluf::f('allowed_scm', array())))
{
$key_types[__("monotone")] = 'mtn';
}
return $key_types;
}
} }

View File

@ -0,0 +1,55 @@
<?php
/* -*- tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
/*
# ***** BEGIN LICENSE BLOCK *****
# This file is part of InDefero, an open source project management application.
# Copyright (C) 2008 Céondo Ltd and contributors.
#
# InDefero is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# InDefero is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
#
# ***** END LICENSE BLOCK ***** */
/**
* Add the type column in the keys table.
*/
function IDF_Migrations_16KeyType_up($params=null)
{
$table = Pluf::factory('IDF_Keys')->getSqlTable();
$sql = array();
$sql['PostgreSQL'] = 'ALTER TABLE '.$table.' ADD COLUMN "type" VARCHAR(3) DEFAULT \'ssh\'';
$sql['MySQL'] = 'ALTER TABLE '.$table.' ADD COLUMN `type` VARCHAR(3) DEFAULT \'ssh\'';
$db = Pluf::db();
$engine = Pluf::f('db_engine');
if (!isset($sql[$engine])) {
throw new Exception('SQLite complex migration not supported.');
}
$db->execute($sql[$engine]);
}
function IDF_Migrations_16KeyType_down($params=null)
{
$table = Pluf::factory('IDF_Keys')->getSqlTable();
$sql = array();
$sql['PostgreSQL'] = 'ALTER TABLE '.$table.' DROP COLUMN "type"';
$sql['MySQL'] = 'ALTER TABLE '.$table.' DROP COLUMN `type`';
$db = Pluf::db();
$engine = Pluf::f('db_engine');
if (!isset($sql[$engine])) {
throw new Exception('SQLite complex migration not supported.');
}
$db->execute($sql[$engine]);
}

View File

@ -48,13 +48,13 @@ class IDF_Plugin_SyncGit_Cron
$out = ''; $out = '';
$keys = Pluf::factory('IDF_Key')->getList(array('view'=>'join_user')); $keys = Pluf::factory('IDF_Key')->getList(array('view'=>'join_user'));
foreach ($keys as $key) { foreach ($keys as $key) {
if (strlen($key->content) > 40 // minimal check if ($key->type == 'ssh' && strlen($key->content) > 40 // minimal check
and preg_match('/^[a-zA-Z][a-zA-Z0-9_.-]*(@[a-zA-Z][a-zA-Z0-9.-]*)?$/', $key->login)) { and preg_match('/^[a-zA-Z][a-zA-Z0-9_.-]*(@[a-zA-Z][a-zA-Z0-9.-]*)?$/', $key->login)) {
$content = trim(str_replace(array("\n", "\r"), '', $key->content)); $content = trim(str_replace(array("\n", "\r"), '', $key->content));
$out .= sprintf($template, $cmd, $key->login, $content)."\n"; $out .= sprintf($template, $cmd, $key->login, $content)."\n";
} }
} }
file_put_contents($authorized_keys, $out, LOCK_EX); file_put_contents($authorized_keys, $out, LOCK_EX);
} }
/** /**

View File

@ -134,7 +134,7 @@ class IDF_Views_User
} }
/** /**
* Delete a SSH key. * Delete a public key.
* *
* This is redirecting to the preferences * This is redirecting to the preferences
*/ */
@ -148,7 +148,7 @@ class IDF_Views_User
return new Pluf_HTTP_Response_Forbidden($request); return new Pluf_HTTP_Response_Forbidden($request);
} }
$key->delete(); $key->delete();
$request->user->setMessage(__('The SSH key has been deleted.')); $request->user->setMessage(__('The public key has been deleted.'));
} }
return new Pluf_HTTP_Response_Redirect($url); return new Pluf_HTTP_Response_Redirect($url);
} }

View File

@ -43,10 +43,14 @@
</td> </td>
</tr> </tr>
<tr> <tr>
<th>{$form.f.ssh_key.labelTag}:</th> <th>{$form.f.public_key.labelTag}:</th>
<td>{if $form.f.ssh_key.errors}{$form.f.ssh_key.fieldErrors}{/if} <td>{if $form.f.public_key.errors}{$form.f.public_key.fieldErrors}{/if}
{$form.f.ssh_key|unsafe}<br /> {$form.f.public_key|unsafe}<br />
<span class="helptext">{$form.f.ssh_key.help_text}</span> {$form.f.public_key_type.labelTag} {$form.f.public_key_type|unsafe}<br />
<span class="helptext">
{$form.f.public_key.help_text}
{$form.f.public_key_type.help_text}
</span>
</td> </td>
</tr> </tr>
<tr> <tr>

View File

@ -54,10 +54,14 @@
</td> </td>
</tr> </tr>
<tr> <tr>
<th>{$form.f.ssh_key.labelTag}:</th> <th>{$form.f.public_key.labelTag}:</th>
<td>{if $form.f.ssh_key.errors}{$form.f.ssh_key.fieldErrors}{/if} <td>{if $form.f.public_key.errors}{$form.f.public_key.fieldErrors}{/if}
{$form.f.ssh_key|unsafe}<br /> {$form.f.public_key|unsafe}<br />
<span class="helptext">{$form.f.ssh_key.help_text}</span> {$form.f.public_key_type.labelTag} {$form.f.public_key_type|unsafe}<br />
<span class="helptext">
{$form.f.public_key.help_text}
{$form.f.public_key_type.help_text}
</span>
</td> </td>
</tr> </tr>
<tr class="pass-info" id="extra-password"> <tr class="pass-info" id="extra-password">
@ -82,7 +86,7 @@
{if count($keys)} {if count($keys)}
<table summary=" " class="recent-issues"> <table summary=" " class="recent-issues">
<tr><th colspan="2">{trans 'Your Current SSH Keys'}</th></tr> <tr><th colspan="2">{trans 'Your Current Public Keys'}</th></tr>
{foreach $keys as $key}<tr><td> {foreach $keys as $key}<tr><td>
<span class="mono">{$key.showCompact()}</span></td><td> <form class="star" method="post" action="{url 'IDF_Views_User::deleteKey', array($key.id)}"><input type="image" src="{media '/idf/img/trash.png'}" name="submit" value="{trans 'Delete this key'}" /></form> <span class="mono">{$key.showCompact()}</span></td><td> <form class="star" method="post" action="{url 'IDF_Views_User::deleteKey', array($key.id)}"><input type="image" src="{media '/idf/img/trash.png'}" name="submit" value="{trans 'Delete this key'}" /></form>
</td> </td>