mirror of
https://github.com/ilyakooo0/nixpkgs.git
synced 2025-01-02 17:09:09 +03:00
sshd: provide option to disable firewall altering
This commit is contained in:
parent
0b559ed1cd
commit
c61a9dfd2e
@ -21,7 +21,7 @@ let
|
||||
daemon reads in addition to the the user's authorized_keys file.
|
||||
You can combine the <literal>keys</literal> and
|
||||
<literal>keyFiles</literal> options.
|
||||
Warning: If you are using <literal>NixOps</literal> then don't use this
|
||||
Warning: If you are using <literal>NixOps</literal> then don't use this
|
||||
option since it will replace the key required for deployment via ssh.
|
||||
'';
|
||||
};
|
||||
@ -137,6 +137,14 @@ in
|
||||
'';
|
||||
};
|
||||
|
||||
openFirewall = mkOption {
|
||||
type = types.bool;
|
||||
default = true;
|
||||
description = ''
|
||||
Whether to automatically open the specified ports in the firewall.
|
||||
'';
|
||||
};
|
||||
|
||||
listenAddresses = mkOption {
|
||||
type = with types; listOf (submodule {
|
||||
options = {
|
||||
@ -302,7 +310,7 @@ in
|
||||
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = cfg.ports;
|
||||
networking.firewall.allowedTCPPorts = if cfg.openFirewall then cfg.ports else [];
|
||||
|
||||
security.pam.services.sshd =
|
||||
{ startSession = true;
|
||||
|
Loading…
Reference in New Issue
Block a user