mirror of
https://git.proxmox.com/git/pve-access-control
synced 2025-08-03 09:53:46 +00:00
fix #916: allow HTTPS to access custom yubico url
remove the limit to HTTP only, since it would only apply for custom yubico validation server urls anyway.
This commit is contained in:
parent
ae2a6bf9d3
commit
ba6c2e6699
@ -1199,8 +1199,6 @@ sub yubico_verify_otp {
|
||||
|
||||
die "yubico: wrong OTP lenght\n" if (length($otp) < 32) || (length($otp) > 48);
|
||||
|
||||
# we always use http, because https cert verification always make problem, and
|
||||
# some proxies does not work with https.
|
||||
|
||||
$url = 'http://api2.yubico.com/wsapi/2.0/verify' if !defined($url);
|
||||
|
||||
@ -1217,10 +1215,10 @@ sub yubico_verify_otp {
|
||||
|
||||
my $req = HTTP::Request->new('GET' => "$url?$paramstr");
|
||||
|
||||
my $ua = LWP::UserAgent->new(protocols_allowed => ['http'], timeout => 30);
|
||||
my $ua = LWP::UserAgent->new(protocols_allowed => ['http', 'https'], timeout => 30);
|
||||
|
||||
if ($proxy) {
|
||||
$ua->proxy(['http'], $proxy);
|
||||
$ua->proxy(['http', 'https'], $proxy);
|
||||
} else {
|
||||
$ua->env_proxy;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user