2014-04-14 16:26:48 +02:00
|
|
|
{ config, lib, pkgs, ... }:
|
2010-02-01 18:05:02 +01:00
|
|
|
|
2014-04-14 16:26:48 +02:00
|
|
|
with lib;
|
2009-03-06 13:26:08 +01:00
|
|
|
|
2007-01-07 11:19:16 +01:00
|
|
|
let
|
2009-03-06 13:26:08 +01:00
|
|
|
|
2012-03-25 17:42:05 +02:00
|
|
|
cfg = config.services.openssh;
|
|
|
|
cfgc = config.programs.ssh;
|
2009-03-06 13:26:08 +01:00
|
|
|
|
|
|
|
nssModulesPath = config.system.nssModules.path;
|
2007-01-07 11:19:16 +01:00
|
|
|
|
2012-05-10 00:11:07 +02:00
|
|
|
knownHosts = map (h: getAttr h cfg.knownHosts) (attrNames cfg.knownHosts);
|
|
|
|
|
2015-01-11 22:04:04 +01:00
|
|
|
knownHostsText = flip (concatMapStringsSep "\n") knownHosts
|
|
|
|
(h:
|
|
|
|
concatStringsSep "," h.hostNames + " "
|
|
|
|
+ (if h.publicKey != null then h.publicKey else readFile h.publicKeyFile)
|
|
|
|
);
|
2012-05-10 00:11:07 +02:00
|
|
|
|
2011-11-29 07:08:55 +01:00
|
|
|
userOptions = {
|
2012-08-17 19:48:22 +02:00
|
|
|
|
2011-11-29 07:08:55 +01:00
|
|
|
openssh.authorizedKeys = {
|
|
|
|
keys = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.listOf types.str;
|
2011-11-29 07:08:55 +01:00
|
|
|
default = [];
|
|
|
|
description = ''
|
2012-11-20 15:13:17 +01:00
|
|
|
A list of verbatim OpenSSH public keys that should be added to the
|
|
|
|
user's authorized keys. The keys are added to a file that the SSH
|
|
|
|
daemon reads in addition to the the user's authorized_keys file.
|
|
|
|
You can combine the <literal>keys</literal> and
|
2011-11-29 07:08:55 +01:00
|
|
|
<literal>keyFiles</literal> options.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
keyFiles = mkOption {
|
2014-05-01 23:27:16 +02:00
|
|
|
type = types.listOf types.path;
|
2011-11-29 07:08:55 +01:00
|
|
|
default = [];
|
|
|
|
description = ''
|
2012-11-20 15:13:17 +01:00
|
|
|
A list of files each containing one OpenSSH public key that should be
|
|
|
|
added to the user's authorized keys. The contents of the files are
|
|
|
|
read at build time and added to a file that the SSH daemon reads in
|
|
|
|
addition to the the user's authorized_keys file. You can combine the
|
|
|
|
<literal>keyFiles</literal> and <literal>keys</literal> options.
|
2011-11-29 07:08:55 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
2012-08-17 19:48:22 +02:00
|
|
|
|
2011-11-29 07:08:55 +01:00
|
|
|
};
|
|
|
|
|
2012-12-11 17:14:52 +01:00
|
|
|
authKeysFiles = let
|
2012-11-20 15:13:17 +01:00
|
|
|
mkAuthKeyFile = u: {
|
|
|
|
target = "ssh/authorized_keys.d/${u.name}";
|
2014-06-27 09:19:30 +02:00
|
|
|
mode = "0444";
|
2012-11-20 15:13:17 +01:00
|
|
|
source = pkgs.writeText "${u.name}-authorized_keys" ''
|
|
|
|
${concatStringsSep "\n" u.openssh.authorizedKeys.keys}
|
2013-11-12 13:48:19 +01:00
|
|
|
${concatMapStrings (f: readFile f + "\n") u.openssh.authorizedKeys.keyFiles}
|
2012-11-20 15:13:17 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
usersWithKeys = attrValues (flip filterAttrs config.users.extraUsers (n: u:
|
|
|
|
length u.openssh.authorizedKeys.keys != 0 || length u.openssh.authorizedKeys.keyFiles != 0
|
|
|
|
));
|
2012-12-11 17:14:52 +01:00
|
|
|
in map mkAuthKeyFile usersWithKeys;
|
2011-11-29 07:08:55 +01:00
|
|
|
|
2007-01-07 11:19:16 +01:00
|
|
|
in
|
2006-11-23 18:43:28 +01:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
{
|
2007-06-08 17:41:12 +02:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
###### interface
|
2011-07-12 12:34:30 +02:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
options = {
|
2011-07-12 12:34:30 +02:00
|
|
|
|
2010-03-11 18:02:49 +01:00
|
|
|
services.openssh = {
|
2009-07-15 17:53:39 +02:00
|
|
|
|
|
|
|
enable = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.bool;
|
2009-07-15 17:53:39 +02:00
|
|
|
default = false;
|
|
|
|
description = ''
|
2010-03-11 18:02:49 +01:00
|
|
|
Whether to enable the OpenSSH secure shell daemon, which
|
|
|
|
allows secure remote logins.
|
2009-07-15 17:53:39 +02:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2014-04-22 16:07:53 +02:00
|
|
|
startWhenNeeded = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
If set, <command>sshd</command> is socket-activated; that
|
|
|
|
is, instead of having it permanently running as a daemon,
|
|
|
|
systemd will start an instance for each incoming connection.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
forwardX11 = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.bool;
|
2012-03-25 17:42:05 +02:00
|
|
|
default = cfgc.setXAuthLocation;
|
2009-07-15 17:53:39 +02:00
|
|
|
description = ''
|
|
|
|
Whether to allow X11 connections to be forwarded.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
allowSFTP = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.bool;
|
2009-07-15 17:53:39 +02:00
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
Whether to enable the SFTP subsystem in the SSH daemon. This
|
|
|
|
enables the use of commands such as <command>sftp</command> and
|
|
|
|
<command>sshfs</command>.
|
|
|
|
'';
|
|
|
|
};
|
2006-11-23 18:43:28 +01:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
permitRootLogin = mkOption {
|
2012-08-17 19:32:23 +02:00
|
|
|
default = "without-password";
|
2015-03-19 17:03:09 +01:00
|
|
|
type = types.enum ["yes" "without-password" "forced-commands-only" "no"];
|
2009-07-15 17:53:39 +02:00
|
|
|
description = ''
|
2015-03-19 17:03:09 +01:00
|
|
|
Whether the root user can login using ssh.
|
2009-07-15 17:53:39 +02:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
gatewayPorts = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.str;
|
2009-07-15 17:53:39 +02:00
|
|
|
default = "no";
|
|
|
|
description = ''
|
|
|
|
Specifies whether remote hosts are allowed to connect to
|
|
|
|
ports forwarded for the client. See
|
|
|
|
<citerefentry><refentrytitle>sshd_config</refentrytitle>
|
|
|
|
<manvolnum>5</manvolnum></citerefentry>.
|
|
|
|
'';
|
|
|
|
};
|
2009-12-10 15:45:41 +01:00
|
|
|
|
|
|
|
ports = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.listOf types.int;
|
2009-12-10 15:45:41 +01:00
|
|
|
default = [22];
|
|
|
|
description = ''
|
|
|
|
Specifies on which ports the SSH daemon listens.
|
|
|
|
'';
|
|
|
|
};
|
2011-07-12 12:34:27 +02:00
|
|
|
|
2014-08-31 13:15:39 +02:00
|
|
|
listenAddresses = mkOption {
|
|
|
|
type = types.listOf types.optionSet;
|
|
|
|
default = [];
|
|
|
|
example = [ { addr = "192.168.3.1"; port = 22; } { addr = "0.0.0.0"; port = 64022; } ];
|
|
|
|
description = ''
|
|
|
|
List of addresses and ports to listen on (ListenAddress directive
|
|
|
|
in config). If port is not specified for address sshd will listen
|
2014-09-01 13:02:39 +02:00
|
|
|
on all ports specified by <literal>ports</literal> option.
|
|
|
|
NOTE: this will override default listening on all local addresses and port 22.
|
2014-08-31 17:21:14 +02:00
|
|
|
NOTE: setting this option won't automatically enable given ports
|
|
|
|
in firewall configuration.
|
2014-08-31 13:15:39 +02:00
|
|
|
'';
|
|
|
|
options = {
|
|
|
|
addr = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
Host, IPv4 or IPv6 address to listen to.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
port = mkOption {
|
|
|
|
type = types.nullOr types.int;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
Port to listen to.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2011-07-12 12:34:27 +02:00
|
|
|
passwordAuthentication = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.bool;
|
2011-07-12 12:34:27 +02:00
|
|
|
default = true;
|
|
|
|
description = ''
|
2013-10-15 15:05:49 +02:00
|
|
|
Specifies whether password authentication is allowed.
|
2011-07-12 12:34:27 +02:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2012-04-01 12:54:17 +02:00
|
|
|
challengeResponseAuthentication = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.bool;
|
2012-04-01 12:54:17 +02:00
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
Specifies whether challenge/response authentication is allowed.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2013-08-24 01:01:10 +02:00
|
|
|
hostKeys = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.listOf types.attrs;
|
2013-08-24 01:01:10 +02:00
|
|
|
default =
|
2015-07-27 20:13:08 +02:00
|
|
|
[ { type = "rsa"; bits = 4096; path = "/etc/ssh/ssh_host_rsa_key"; }
|
|
|
|
{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; }
|
|
|
|
] ++ optionals (!versionAtLeast config.system.stateVersion "15.07")
|
|
|
|
[ { type = "dsa"; path = "/etc/ssh/ssh_host_dsa_key"; }
|
|
|
|
{ type = "ecdsa"; bits = 521; path = "/etc/ssh/ssh_host_ecdsa_key"; }
|
2013-08-24 01:01:10 +02:00
|
|
|
];
|
2012-05-10 00:13:53 +02:00
|
|
|
description = ''
|
2013-08-24 01:01:10 +02:00
|
|
|
NixOS can automatically generate SSH host keys. This option
|
|
|
|
specifies the path, type and size of each key. See
|
|
|
|
<citerefentry><refentrytitle>ssh-keygen</refentrytitle>
|
|
|
|
<manvolnum>1</manvolnum></citerefentry> for supported types
|
|
|
|
and sizes.
|
2012-05-10 00:13:53 +02:00
|
|
|
'';
|
2012-02-22 21:28:54 +01:00
|
|
|
};
|
|
|
|
|
2012-12-11 17:29:34 +01:00
|
|
|
authorizedKeysFiles = mkOption {
|
2014-05-01 23:27:16 +02:00
|
|
|
type = types.listOf types.str;
|
2012-12-11 17:29:34 +01:00
|
|
|
default = [];
|
|
|
|
description = "Files from with authorized keys are read.";
|
|
|
|
};
|
|
|
|
|
2010-10-18 12:31:41 +02:00
|
|
|
extraConfig = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.lines;
|
2010-10-18 12:31:41 +02:00
|
|
|
default = "";
|
|
|
|
description = "Verbatim contents of <filename>sshd_config</filename>.";
|
|
|
|
};
|
2011-07-12 12:34:30 +02:00
|
|
|
|
2012-05-10 00:11:07 +02:00
|
|
|
knownHosts = mkOption {
|
|
|
|
default = {};
|
|
|
|
type = types.loaOf types.optionSet;
|
|
|
|
description = ''
|
|
|
|
The set of system-wide known SSH hosts.
|
|
|
|
'';
|
|
|
|
example = [
|
2012-08-17 19:48:22 +02:00
|
|
|
{
|
2012-05-10 00:11:07 +02:00
|
|
|
hostNames = [ "myhost" "myhost.mydomain.com" "10.10.1.4" ];
|
2013-10-23 20:06:39 +02:00
|
|
|
publicKeyFile = literalExample "./pubkeys/myhost_ssh_host_dsa_key.pub";
|
2012-05-10 00:11:07 +02:00
|
|
|
}
|
2012-08-17 19:48:22 +02:00
|
|
|
{
|
2012-05-10 00:11:07 +02:00
|
|
|
hostNames = [ "myhost2" ];
|
2013-10-23 20:06:39 +02:00
|
|
|
publicKeyFile = literalExample "./pubkeys/myhost2_ssh_host_dsa_key.pub";
|
2012-05-10 00:11:07 +02:00
|
|
|
}
|
|
|
|
];
|
|
|
|
options = {
|
|
|
|
hostNames = mkOption {
|
2015-06-15 18:18:46 +02:00
|
|
|
type = types.listOf types.str;
|
2012-05-10 00:11:07 +02:00
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
A list of host names and/or IP numbers used for accessing
|
|
|
|
the host's ssh service.
|
|
|
|
'';
|
|
|
|
};
|
2014-04-28 00:01:06 +02:00
|
|
|
publicKey = mkOption {
|
|
|
|
default = null;
|
2014-05-01 23:27:16 +02:00
|
|
|
type = types.nullOr types.str;
|
2015-07-13 16:18:52 +02:00
|
|
|
example = "ecdsa-sha2-nistp521 AAAAE2VjZHN...UEPg==";
|
2014-04-28 00:01:06 +02:00
|
|
|
description = ''
|
|
|
|
The public key data for the host. You can fetch a public key
|
|
|
|
from a running SSH server with the <command>ssh-keyscan</command>
|
2014-11-27 15:43:54 +01:00
|
|
|
command. The public key should not include any host names, only
|
2015-07-13 16:18:52 +02:00
|
|
|
the key type and the key itself.
|
2014-04-28 00:01:06 +02:00
|
|
|
'';
|
|
|
|
};
|
2012-05-10 00:11:07 +02:00
|
|
|
publicKeyFile = mkOption {
|
2014-04-28 00:01:06 +02:00
|
|
|
default = null;
|
2014-05-01 23:27:16 +02:00
|
|
|
type = types.nullOr types.path;
|
2012-05-10 00:11:07 +02:00
|
|
|
description = ''
|
|
|
|
The path to the public key file for the host. The public
|
|
|
|
key file is read at build time and saved in the Nix store.
|
|
|
|
You can fetch a public key file from a running SSH server
|
2014-11-27 15:43:54 +01:00
|
|
|
with the <command>ssh-keyscan</command> command. The content
|
|
|
|
of the file should follow the same format as described for
|
|
|
|
the <literal>publicKey</literal> option.
|
2012-05-10 00:11:07 +02:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2015-05-22 14:23:21 +02:00
|
|
|
moduliFile = mkOption {
|
|
|
|
example = "services.openssh.moduliFile = /etc/my-local-ssh-moduli;";
|
|
|
|
type = types.path;
|
|
|
|
description = ''
|
|
|
|
Path to <literal>moduli</literal> file to install in
|
|
|
|
<literal>/etc/ssh/moduli</literal>. If this option is unset, then
|
|
|
|
the <literal>moduli</literal> file shipped with OpenSSH will be used.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
};
|
|
|
|
|
2011-11-29 07:08:55 +01:00
|
|
|
users.extraUsers = mkOption {
|
|
|
|
options = [ userOptions ];
|
|
|
|
};
|
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
|
2013-08-24 01:01:10 +02:00
|
|
|
config = mkIf cfg.enable {
|
2009-07-15 17:53:39 +02:00
|
|
|
|
2015-04-19 21:15:33 +02:00
|
|
|
users.extraUsers.sshd =
|
2015-05-13 16:22:53 +02:00
|
|
|
{ isSystemUser = true;
|
|
|
|
description = "SSH privilege separation user";
|
2009-07-15 17:53:39 +02:00
|
|
|
};
|
2009-03-06 13:26:13 +01:00
|
|
|
|
2015-05-22 14:23:21 +02:00
|
|
|
services.openssh.moduliFile = mkDefault "${cfgc.package}/etc/ssh/moduli";
|
|
|
|
|
2012-11-20 15:13:17 +01:00
|
|
|
environment.etc = authKeysFiles ++ [
|
2015-05-22 14:23:21 +02:00
|
|
|
{ source = cfg.moduliFile;
|
2010-02-01 18:05:02 +01:00
|
|
|
target = "ssh/moduli";
|
2012-05-10 00:11:07 +02:00
|
|
|
}
|
2015-01-11 22:04:04 +01:00
|
|
|
{ text = knownHostsText;
|
2012-05-10 00:11:07 +02:00
|
|
|
target = "ssh/ssh_known_hosts";
|
|
|
|
}
|
|
|
|
];
|
2010-02-01 18:05:02 +01:00
|
|
|
|
2014-04-22 16:07:53 +02:00
|
|
|
systemd =
|
|
|
|
let
|
|
|
|
service =
|
|
|
|
{ description = "SSH Daemon";
|
|
|
|
|
|
|
|
wantedBy = optional (!cfg.startWhenNeeded) "multi-user.target";
|
|
|
|
|
|
|
|
stopIfChanged = false;
|
|
|
|
|
2014-09-12 06:43:58 +02:00
|
|
|
path = [ cfgc.package pkgs.gawk ];
|
2014-04-22 16:07:53 +02:00
|
|
|
|
|
|
|
environment.LD_LIBRARY_PATH = nssModulesPath;
|
|
|
|
|
|
|
|
preStart =
|
|
|
|
''
|
|
|
|
mkdir -m 0755 -p /etc/ssh
|
|
|
|
|
|
|
|
${flip concatMapStrings cfg.hostKeys (k: ''
|
|
|
|
if ! [ -f "${k.path}" ]; then
|
2015-02-23 16:46:45 +01:00
|
|
|
ssh-keygen -t "${k.type}" ${if k ? bits then "-b ${toString k.bits}" else ""} -f "${k.path}" -N ""
|
2014-04-22 16:07:53 +02:00
|
|
|
fi
|
|
|
|
'')}
|
|
|
|
'';
|
|
|
|
|
|
|
|
serviceConfig =
|
|
|
|
{ ExecStart =
|
2014-09-12 06:43:58 +02:00
|
|
|
"${cfgc.package}/sbin/sshd " + (optionalString cfg.startWhenNeeded "-i ") +
|
2014-04-22 16:07:53 +02:00
|
|
|
"-f ${pkgs.writeText "sshd_config" cfg.extraConfig}";
|
|
|
|
KillMode = "process";
|
|
|
|
} // (if cfg.startWhenNeeded then {
|
|
|
|
StandardInput = "socket";
|
|
|
|
} else {
|
|
|
|
Restart = "always";
|
|
|
|
Type = "forking";
|
|
|
|
PIDFile = "/run/sshd.pid";
|
|
|
|
});
|
|
|
|
};
|
|
|
|
in
|
2012-06-18 21:28:31 +02:00
|
|
|
|
2014-04-22 16:07:53 +02:00
|
|
|
if cfg.startWhenNeeded then {
|
2013-01-05 01:05:25 +01:00
|
|
|
|
2014-04-22 16:07:53 +02:00
|
|
|
sockets.sshd =
|
|
|
|
{ description = "SSH Socket";
|
|
|
|
wantedBy = [ "sockets.target" ];
|
|
|
|
socketConfig.ListenStream = cfg.ports;
|
|
|
|
socketConfig.Accept = true;
|
|
|
|
};
|
2012-08-17 19:48:22 +02:00
|
|
|
|
2014-04-22 16:07:53 +02:00
|
|
|
services."sshd@" = service;
|
2012-06-18 21:28:31 +02:00
|
|
|
|
2014-04-22 16:07:53 +02:00
|
|
|
} else {
|
2012-06-18 21:28:31 +02:00
|
|
|
|
2014-04-22 16:07:53 +02:00
|
|
|
services.sshd = service;
|
2012-06-18 21:28:31 +02:00
|
|
|
|
|
|
|
};
|
|
|
|
|
2010-02-01 18:05:02 +01:00
|
|
|
networking.firewall.allowedTCPPorts = cfg.ports;
|
2010-10-18 12:31:41 +02:00
|
|
|
|
2013-10-15 15:05:49 +02:00
|
|
|
security.pam.services.sshd =
|
2014-04-22 15:39:11 +02:00
|
|
|
{ startSession = true;
|
2013-10-15 15:05:49 +02:00
|
|
|
showMotd = true;
|
|
|
|
unixAuth = cfg.passwordAuthentication;
|
|
|
|
};
|
2012-08-17 19:48:22 +02:00
|
|
|
|
2012-12-11 17:29:34 +01:00
|
|
|
services.openssh.authorizedKeysFiles =
|
|
|
|
[ ".ssh/authorized_keys" ".ssh/authorized_keys2" "/etc/ssh/authorized_keys.d/%u" ];
|
|
|
|
|
2010-10-18 12:31:41 +02:00
|
|
|
services.openssh.extraConfig =
|
|
|
|
''
|
2012-06-15 00:44:56 +02:00
|
|
|
PidFile /run/sshd.pid
|
2012-08-17 19:48:22 +02:00
|
|
|
|
2010-10-18 12:31:41 +02:00
|
|
|
Protocol 2
|
|
|
|
|
2013-10-15 15:05:49 +02:00
|
|
|
UsePAM yes
|
2010-10-18 12:31:41 +02:00
|
|
|
|
2015-03-09 11:26:18 +01:00
|
|
|
UsePrivilegeSeparation sandbox
|
|
|
|
|
2012-10-24 19:01:27 +02:00
|
|
|
AddressFamily ${if config.networking.enableIPv6 then "any" else "inet"}
|
2010-10-18 12:31:41 +02:00
|
|
|
${concatMapStrings (port: ''
|
|
|
|
Port ${toString port}
|
|
|
|
'') cfg.ports}
|
|
|
|
|
2015-04-15 00:20:38 +02:00
|
|
|
${concatMapStrings ({ port, addr, ... }: ''
|
2014-08-31 13:15:39 +02:00
|
|
|
ListenAddress ${addr}${if port != null then ":" + toString port else ""}
|
|
|
|
'') cfg.listenAddresses}
|
|
|
|
|
2012-03-25 17:42:05 +02:00
|
|
|
${optionalString cfgc.setXAuthLocation ''
|
|
|
|
XAuthLocation ${pkgs.xorg.xauth}/bin/xauth
|
|
|
|
''}
|
|
|
|
|
2010-10-18 12:31:41 +02:00
|
|
|
${if cfg.forwardX11 then ''
|
|
|
|
X11Forwarding yes
|
|
|
|
'' else ''
|
|
|
|
X11Forwarding no
|
|
|
|
''}
|
|
|
|
|
|
|
|
${optionalString cfg.allowSFTP ''
|
2014-09-12 06:43:58 +02:00
|
|
|
Subsystem sftp ${cfgc.package}/libexec/sftp-server
|
2010-10-18 12:31:41 +02:00
|
|
|
''}
|
|
|
|
|
|
|
|
PermitRootLogin ${cfg.permitRootLogin}
|
|
|
|
GatewayPorts ${cfg.gatewayPorts}
|
2011-07-12 12:34:27 +02:00
|
|
|
PasswordAuthentication ${if cfg.passwordAuthentication then "yes" else "no"}
|
2012-04-01 12:54:17 +02:00
|
|
|
ChallengeResponseAuthentication ${if cfg.challengeResponseAuthentication then "yes" else "no"}
|
2012-10-23 15:10:48 +02:00
|
|
|
|
|
|
|
PrintMotd no # handled by pam_motd
|
2012-12-11 17:40:39 +01:00
|
|
|
|
2012-12-11 17:29:34 +01:00
|
|
|
AuthorizedKeysFile ${toString cfg.authorizedKeysFiles}
|
2013-08-24 01:01:10 +02:00
|
|
|
|
|
|
|
${flip concatMapStrings cfg.hostKeys (k: ''
|
|
|
|
HostKey ${k.path}
|
|
|
|
'')}
|
2010-10-18 12:31:41 +02:00
|
|
|
'';
|
|
|
|
|
2012-04-26 10:13:24 +02:00
|
|
|
assertions = [{ assertion = if cfg.forwardX11 then cfgc.setXAuthLocation else true;
|
2014-04-28 00:01:06 +02:00
|
|
|
message = "cannot enable X11 forwarding without setting xauth location";}]
|
|
|
|
++ flip mapAttrsToList cfg.knownHosts (name: data: {
|
|
|
|
assertion = (data.publicKey == null && data.publicKeyFile != null) ||
|
|
|
|
(data.publicKey != null && data.publicKeyFile == null);
|
|
|
|
message = "knownHost ${name} must contain either a publicKey or publicKeyFile";
|
2014-08-31 13:15:39 +02:00
|
|
|
})
|
2015-04-15 00:20:38 +02:00
|
|
|
++ flip map cfg.listenAddresses ({ addr, port, ... }: {
|
2014-08-31 13:15:39 +02:00
|
|
|
assertion = addr != null;
|
2014-09-02 10:06:04 +02:00
|
|
|
message = "addr must be specified in each listenAddresses entry";
|
2014-04-28 00:01:06 +02:00
|
|
|
});
|
2012-10-23 15:10:48 +02:00
|
|
|
|
2009-03-06 13:26:08 +01:00
|
|
|
};
|
2009-07-15 17:53:39 +02:00
|
|
|
|
2006-11-23 18:43:28 +01:00
|
|
|
}
|