nixos-config/2configs/share-user-sftp.nix

23 lines
488 B
Nix
Raw Normal View History

2016-01-14 12:42:52 +01:00
{ config, ... }:
{
users.users = {
share = {
uid = 9002;
home = "/var/empty";
isNormalUser = true;
2016-01-14 12:42:52 +01:00
openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ];
};
};
# we will use internal-sftp to make uncomplicated Chroot work
services.openssh.extraConfig = ''
Match User share
ChrootDirectory /media
ForceCommand internal-sftp
AllowTcpForwarding no
PermitTunnel no
X11Forwarding no
Match All
'';
}