mirror of
https://github.com/nix-community/nix-on-droid.git
synced 2025-11-08 19:46:07 +01:00
modules/openssh: init
This commit is contained in:
parent
dc61ae10fb
commit
3a02d09756
2 changed files with 138 additions and 0 deletions
|
|
@ -16,6 +16,7 @@
|
|||
./environment/shell.nix
|
||||
./home-manager.nix
|
||||
./nixpkgs/options.nix
|
||||
./services/openssh.nix
|
||||
./supervisord.nix
|
||||
./terminal.nix
|
||||
./time.nix
|
||||
|
|
|
|||
137
modules/services/openssh.nix
Normal file
137
modules/services/openssh.nix
Normal file
|
|
@ -0,0 +1,137 @@
|
|||
# Parts from nixpkgs/nixos/modules/services/networking/ssh/sshd.nix
|
||||
# MIT Licensed. Copyright (c) 2003-2022 Eelco Dolstra and the Nixpkgs/NixOS contributors
|
||||
|
||||
{ pkgs, lib, config, ... }:
|
||||
let
|
||||
inherit (lib)
|
||||
types
|
||||
flip
|
||||
concatStringsSep
|
||||
concatMapStrings
|
||||
optionalString;
|
||||
|
||||
cfg = config.services.openssh;
|
||||
|
||||
uncheckedConf = ''
|
||||
${concatMapStrings (port: ''
|
||||
Port ${toString port}
|
||||
'') cfg.ports}
|
||||
PasswordAuthentication ${if cfg.passwordAuthentication then "yes" else "no"}
|
||||
${flip concatMapStrings cfg.hostKeys (k: ''
|
||||
HostKey ${k.path}
|
||||
'')}
|
||||
${optionalString cfg.allowSFTP ''
|
||||
Subsystem sftp ${cfg.package}/libexec/sftp-server
|
||||
''}
|
||||
SetEnv PATH=${config.user.home}/.nix-profile/bin:/usr/bin:/bin
|
||||
${cfg.extraConfig}
|
||||
'';
|
||||
|
||||
sshdConf = pkgs.runCommand "sshd.conf-validated" {
|
||||
nativeBuildInputs = [ cfg.package ];
|
||||
} ''
|
||||
cat >$out <<EOL
|
||||
${uncheckedConf}
|
||||
EOL
|
||||
|
||||
ssh-keygen -q -f mock-hostkey -N ""
|
||||
sshd -t -f $out -h mock-hostkey
|
||||
'';
|
||||
in {
|
||||
options = {
|
||||
services.openssh = {
|
||||
enable = lib.mkOption {
|
||||
description = lib.mdDoc ''
|
||||
Whether to enable the OpenSSH secure shell daemon, which
|
||||
allows secure remote logins.
|
||||
'';
|
||||
type = types.bool;
|
||||
default = false;
|
||||
};
|
||||
package = lib.mkOption {
|
||||
description = ''
|
||||
The package to use for OpenSSH.
|
||||
'';
|
||||
type = types.package;
|
||||
default = pkgs.openssh;
|
||||
defaultText = lib.literalExpression "pkgs.openssh";
|
||||
};
|
||||
ports = lib.mkOption {
|
||||
description = lib.mdDoc ''
|
||||
Specifies on which ports the SSH daemon listens.
|
||||
'';
|
||||
type = types.listOf types.port;
|
||||
default = [ 8022 ];
|
||||
};
|
||||
passwordAuthentication = lib.mkOption {
|
||||
description = lib.mdDoc ''
|
||||
Whether password authentication is allowed.
|
||||
'';
|
||||
type = types.bool;
|
||||
default = true;
|
||||
};
|
||||
allowSFTP = lib.mkOption {
|
||||
description = lib.mdDoc ''
|
||||
Whether to enable the SFTP subsystem in the SSH daemon. This
|
||||
enables the use of commands such as {command}`sftp` and
|
||||
{command}`sshfs`.
|
||||
'';
|
||||
type = types.bool;
|
||||
default = true;
|
||||
};
|
||||
hostKeys = lib.mkOption {
|
||||
description = lib.mdDoc ''
|
||||
Nix-on-Droid can automatically generate SSH host keys. This option
|
||||
specifies the path, type and size of each key. See
|
||||
{manpage}`ssh-keygen(1)` for supported types
|
||||
and sizes.
|
||||
'';
|
||||
type = types.listOf types.attrs;
|
||||
default =
|
||||
[ { type = "rsa"; bits = 4096; path = "/etc/ssh/ssh_host_rsa_key"; }
|
||||
{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; }
|
||||
];
|
||||
example =
|
||||
[ { type = "rsa"; bits = 4096; path = "/etc/ssh/ssh_host_rsa_key"; rounds = 100; openSSHFormat = true; }
|
||||
{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; rounds = 100; comment = "key comment"; }
|
||||
];
|
||||
};
|
||||
extraConfig = lib.mkOption {
|
||||
description = lib.mdDoc "Verbatim contents of {file}`sshd_config`.";
|
||||
type = types.lines;
|
||||
default = "";
|
||||
};
|
||||
};
|
||||
};
|
||||
config = lib.mkIf cfg.enable {
|
||||
environment.etc = {
|
||||
"ssh/sshd_config".source = sshdConf;
|
||||
"ssh/moduli".source = "${cfg.package}/etc/ssh/moduli";
|
||||
};
|
||||
|
||||
supervisord.programs.sshd = {
|
||||
path = [ cfg.package ];
|
||||
autoRestart = true;
|
||||
script = ''
|
||||
${flip concatMapStrings cfg.hostKeys (k: ''
|
||||
if ! [ -s "${k.path}" ]; then
|
||||
if ! [ -h "${k.path}" ]; then
|
||||
rm -f "${k.path}"
|
||||
fi
|
||||
mkdir -m 0755 -p "$(dirname '${k.path}')"
|
||||
ssh-keygen \
|
||||
-t "${k.type}" \
|
||||
${if k ? bits then "-b ${toString k.bits}" else ""} \
|
||||
${if k ? rounds then "-a ${toString k.rounds}" else ""} \
|
||||
${if k ? comment then "-C '${k.comment}'" else ""} \
|
||||
${if k ? openSSHFormat && k.openSSHFormat then "-o" else ""} \
|
||||
-f "${k.path}" \
|
||||
-N ""
|
||||
fi
|
||||
'')}
|
||||
|
||||
exec ${cfg.package}/bin/sshd -D -f /etc/ssh/sshd_config
|
||||
'';
|
||||
};
|
||||
};
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue