dotfiles/modules/nixos/services/sshd.nix

40 lines
969 B
Nix
Raw Normal View History

{ config, lib, ... }: {
2022-09-20 11:50:45 +00:00
options = {
publicKey = lib.mkOption {
2023-01-21 14:29:03 +00:00
type = lib.types.nullOr lib.types.str;
2022-09-20 11:50:45 +00:00
description = "Public SSH key authorized for this system.";
default = null;
2022-09-20 11:50:45 +00:00
};
permitRootLogin = lib.mkOption {
type = lib.types.str;
description = "Root login settings.";
default = "no";
};
2022-09-20 11:50:45 +00:00
};
2023-04-16 00:55:56 +00:00
config = lib.mkIf (config.publicKey != null) {
services.openssh = {
enable = true;
ports = [ 22 ];
allowSFTP = true;
settings = {
GatewayPorts = "no";
X11Forwarding = false;
PasswordAuthentication = false;
PermitRootLogin = config.permitRootLogin;
2023-01-21 14:29:03 +00:00
};
};
2022-09-20 11:50:45 +00:00
users.users.${config.user}.openssh.authorizedKeys.keys =
[ config.publicKey ];
2022-10-13 23:40:30 +00:00
# Implement a simple fail2ban service for sshd
services.sshguard.enable = true;
2022-11-03 12:51:51 +00:00
# Add terminfo for SSH from popular terminal emulators
environment.enableAllTerminfo = true;
};
2022-09-20 11:50:45 +00:00
}