[pve-devel] SPAM: [PATCH pve-access-control 1/1] Fixed #3686: User Removing Failure
Thomas Lamprecht
t.lamprecht at proxmox.com
Fri Nov 5 07:26:31 CET 2021
On 19.10.21 20:50, Jasper Yu wrote:
> From: Li-Heng Yu <007seadog at gmail.com>
>
> Signed-off-by: Li-Heng Yu <007seadog at gmail.com>
> ---
> src/PVE/AccessControl.pm | 5 ++++-
> 1 file changed, 4 insertions(+), 1 deletion(-)
>
> diff --git a/src/PVE/AccessControl.pm b/src/PVE/AccessControl.pm
> index fcb16bd..0d2c6c0 100644
> --- a/src/PVE/AccessControl.pm
> +++ b/src/PVE/AccessControl.pm
> @@ -1628,7 +1628,10 @@ sub user_set_tfa {
> die "realm '$realm' does not allow removing the 2nd factor\n" if defined($user);
> }
> } else {
> - die "user '$userid' not found\n" if !defined($user);
> + # Remove user in non-TFA-enforcement realm
> + if (defined($data)) {
> + die "user '$userid' not found\n" if !defined($user);
> + }
> # Without a realm-enforced TFA setting the user can add a u2f or totp entry by themselves.
> # The 'yubico' type requires yubico server settings, which have to be configured on the
> # realm, so this is not supported here:
>
just for the record, it seems Dominik beat you to it by a few hours, same approach
different syntax:
https://lists.proxmox.com/pipermail/pve-devel/2021-October/050443.html
Thanks for your contribution effort nonetheless though!
More information about the pve-devel
mailing list