changeset 1661:6a6a0bac52f4

Don't log authorized_keys command= every time
author Matt Johnston <matt@ucc.asn.au>
date Sat, 14 Mar 2020 23:26:37 +0800
parents 26e07f7f682a
children 8a7d26e86a56
files svr-authpubkeyoptions.c
diffstat 1 files changed, 1 insertions(+), 2 deletions(-) [+]
line wrap: on
line diff
--- a/svr-authpubkeyoptions.c	Sat Mar 14 14:21:01 2020 +0000
+++ b/svr-authpubkeyoptions.c	Sat Mar 14 23:26:37 2020 +0800
@@ -92,6 +92,7 @@
  * by any 'command' public key option. */
 void svr_pubkey_set_forced_command(struct ChanSess *chansess) {
 	if (ses.authstate.pubkey_options && ses.authstate.pubkey_options->forced_command) {
+		TRACE(("Forced command '%s'", ses.authstate.pubkey_options->forced_command))
 		if (chansess->cmd) {
 			/* original_command takes ownership */
 			chansess->original_command = chansess->cmd;
@@ -182,8 +183,6 @@
 					memcpy(ses.authstate.pubkey_options->forced_command,
 							command_start, command_len-1);
 					ses.authstate.pubkey_options->forced_command[command_len-1] = '\0';
-					dropbear_log(LOG_WARNING, "Forced command '%s'", 
-						ses.authstate.pubkey_options->forced_command);
 					goto next_option;
 				}
 				escaped = (!escaped && c == '\\');