mirror of
https://github.com/ilyakooo0/nixpkgs.git
synced 2024-11-19 02:44:17 +03:00
80377e512e
svn path=/nixos/trunk/; revision=13363
71 lines
1.4 KiB
Nix
71 lines
1.4 KiB
Nix
{ writeText, openssh, glibc, xauth
|
|
, nssModulesPath
|
|
, forwardX11, allowSFTP, permitRootLogin, gatewayPorts
|
|
}:
|
|
|
|
assert permitRootLogin == "yes" ||
|
|
permitRootLogin == "without-password" ||
|
|
permitRootLogin == "forced-commands-only" ||
|
|
permitRootLogin == "no";
|
|
|
|
let
|
|
|
|
sshdConfig = writeText "sshd_config" ''
|
|
|
|
Protocol 2
|
|
|
|
UsePAM yes
|
|
|
|
${if forwardX11 then "
|
|
X11Forwarding yes
|
|
XAuthLocation ${xauth}/bin/xauth
|
|
" else "
|
|
X11Forwarding no
|
|
"}
|
|
|
|
${if allowSFTP then "
|
|
Subsystem sftp ${openssh}/libexec/sftp-server
|
|
" else "
|
|
"}
|
|
|
|
PermitRootLogin ${permitRootLogin}
|
|
GatewayPorts ${gatewayPorts}
|
|
|
|
'';
|
|
|
|
sshdUid = (import ../system/ids.nix).uids.sshd;
|
|
|
|
in
|
|
|
|
{
|
|
name = "sshd";
|
|
|
|
users = [
|
|
{ name = "sshd";
|
|
uid = (import ../system/ids.nix).uids.sshd;
|
|
description = "SSH privilege separation user";
|
|
home = "/var/empty";
|
|
}
|
|
];
|
|
|
|
job = ''
|
|
description "SSH server"
|
|
|
|
start on network-interfaces/started
|
|
stop on network-interfaces/stop
|
|
|
|
env LD_LIBRARY_PATH=${nssModulesPath}
|
|
|
|
start script
|
|
mkdir -m 0755 -p /etc/ssh
|
|
|
|
if ! test -f /etc/ssh/ssh_host_dsa_key; then
|
|
${openssh}/bin/ssh-keygen -t dsa -b 1024 -f /etc/ssh/ssh_host_dsa_key -N ""
|
|
fi
|
|
end script
|
|
|
|
respawn ${openssh}/sbin/sshd -D -h /etc/ssh/ssh_host_dsa_key -f ${sshdConfig}
|
|
'';
|
|
|
|
}
|