diff options
author | Geoffrey Huntley <ghuntley@ghuntley.com> | 2018-03-21 16:46:35 -0700 |
---|---|---|
committer | Matthew Justin Bauer <mjbauer95@gmail.com> | 2018-03-21 18:46:35 -0500 |
commit | a88ec5e8a5c04be6b6214a77aa4bb94ac9da5bb2 (patch) | |
tree | 2216410a8bab339803221a6ab508e95cd8c3adc6 | |
parent | f60d7e2add2906a50615045599c83087b90ff130 (diff) | |
download | nixlib-a88ec5e8a5c04be6b6214a77aa4bb94ac9da5bb2.tar nixlib-a88ec5e8a5c04be6b6214a77aa4bb94ac9da5bb2.tar.gz nixlib-a88ec5e8a5c04be6b6214a77aa4bb94ac9da5bb2.tar.bz2 nixlib-a88ec5e8a5c04be6b6214a77aa4bb94ac9da5bb2.tar.lz nixlib-a88ec5e8a5c04be6b6214a77aa4bb94ac9da5bb2.tar.xz nixlib-a88ec5e8a5c04be6b6214a77aa4bb94ac9da5bb2.tar.zst nixlib-a88ec5e8a5c04be6b6214a77aa4bb94ac9da5bb2.zip |
duosec: use root uid as sshd uid has been retired (#33597)
* fix: use root uid as sshd uid has been retired fixes https://github.com/NixOS/nixpkgs/issues/10088 related PR (abandoned) at https://github.com/NixOS/nixpkgs/pull/15391 * must use "sshd" user otherwise duosec does not work in multi user mode see https://github.com/duosecurity/duo_unix/issues/89#issuecomment-272062632
-rw-r--r-- | nixos/modules/security/duosec.nix | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/nixos/modules/security/duosec.nix b/nixos/modules/security/duosec.nix index 9ca818e86ffa..df6108dede7c 100644 --- a/nixos/modules/security/duosec.nix +++ b/nixos/modules/security/duosec.nix @@ -25,14 +25,14 @@ let loginCfgFile = optional cfg.ssh.enable { source = pkgs.writeText "login_duo.conf" configFile; mode = "0600"; - uid = config.ids.uids.sshd; + user = "sshd"; target = "duo/login_duo.conf"; }; pamCfgFile = optional cfg.pam.enable { source = pkgs.writeText "pam_duo.conf" configFile; mode = "0600"; - uid = config.ids.uids.sshd; + user = "sshd"; target = "duo/pam_duo.conf"; }; in |