grim/hgkeeper

Fix wrong parameter of ssh-keygen

14 months ago, aklitzing
07d2669c823b
Fix wrong parameter of ssh-keygen

usage: ssh-keygen [-q] [-a rounds] [-b bits] [-C comment] [-f output_keyfile]
[-m format] [-N new_passphrase] [-O option]
[-t dsa | ecdsa | ecdsa-sk | ed25519 | ed25519-sk | rsa]
[-w provider] [-Z cipher]

Reviewed at https://reviews.imfreedom.org/r/2418/
1.1.0: (2023-01-04)
* Add a warning message when a duplicate key is loaded. No behavior changes
were made so that users depending on the broken behavior can continue
working. (HGKEEPER-22)
* Removed the mercurial 6.1 pin from the container image.
* Normalize paths before passing them to the authorization checker. This bug
allowed attackers to read repositories they shouldn't have been able to by
adding a / on to the end of the path. The hgkeeper repo in the default
configuration is susceptible to this attack.
1.0.0: (2022-06-21)
* Official first release!