mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-10-21 11:22:35 -04:00
cf10d7aef8
* services.openssh: support freeform settings Keep "extraConfig" but introduces "settings". Also renames several options (mkRenamedOptionModule [ "services" "openssh" "kbdInteractiveAuthentication" ] [ "services" "openssh" "settings" "KbdInteractiveAuthentication" ]) (mkRenamedOptionModule [ "services" "openssh" "passwordAuthentication" ] [ "services" "openssh" "settings" "PasswordAuthentication" ]) (mkRenamedOptionModule [ "services" "openssh" "useDns" ] [ "services" "openssh" "settings" "UseDns" ]) (mkRenamedOptionModule [ "services" "openssh" "permitRootLogin" ] [ "services" "openssh" "settings" "PermitRootLogin" ]) * updated doc * regen doc
28 lines
844 B
Nix
28 lines
844 B
Nix
{ pkgs, ... }:
|
|
let
|
|
inherit (import ./../ssh-keys.nix pkgs)
|
|
snakeOilPrivateKey snakeOilPublicKey;
|
|
in {
|
|
networking.firewall.allowedTCPPorts = [ 80 ];
|
|
|
|
systemd.services.mock-google-metadata = {
|
|
description = "Mock Google metadata service";
|
|
serviceConfig.Type = "simple";
|
|
serviceConfig.ExecStart = "${pkgs.python3}/bin/python ${./server.py}";
|
|
environment = {
|
|
SNAKEOIL_PUBLIC_KEY = snakeOilPublicKey;
|
|
};
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ];
|
|
};
|
|
|
|
services.openssh.enable = true;
|
|
services.openssh.settings.KbdInteractiveAuthentication = false;
|
|
services.openssh.settings.PasswordAuthentication = false;
|
|
|
|
security.googleOsLogin.enable = true;
|
|
|
|
# Mock google service
|
|
networking.interfaces.lo.ipv4.addresses = [ { address = "169.254.169.254"; prefixLength = 32; } ];
|
|
}
|