about summary refs log tree commit diff
path: root/nixos/doc/manual/configuration
diff options
context:
space:
mode:
authorMatthieu Coudron <teto@users.noreply.github.com>2023-01-15 16:32:46 +0100
committerGitHub <noreply@github.com>2023-01-15 16:32:46 +0100
commitcf10d7aef8ff9ca0e178e87981d9e4fd3018193c (patch)
tree633e4d0e9ab445d1675e2b002dd29689cdf5e01d /nixos/doc/manual/configuration
parent6dccdc458512abce8d19f74195bb20fdb067df50 (diff)
downloadnixlib-cf10d7aef8ff9ca0e178e87981d9e4fd3018193c.tar
nixlib-cf10d7aef8ff9ca0e178e87981d9e4fd3018193c.tar.gz
nixlib-cf10d7aef8ff9ca0e178e87981d9e4fd3018193c.tar.bz2
nixlib-cf10d7aef8ff9ca0e178e87981d9e4fd3018193c.tar.lz
nixlib-cf10d7aef8ff9ca0e178e87981d9e4fd3018193c.tar.xz
nixlib-cf10d7aef8ff9ca0e178e87981d9e4fd3018193c.tar.zst
nixlib-cf10d7aef8ff9ca0e178e87981d9e4fd3018193c.zip
services.openssh: support freeform settings (#193757)
* services.openssh: support freeform settings

Keep "extraConfig" but introduces "settings".

Also renames several options

(mkRenamedOptionModule [ "services" "openssh" "kbdInteractiveAuthentication" ] [  "services" "openssh" "settings" "KbdInteractiveAuthentication" ])
(mkRenamedOptionModule [ "services" "openssh" "passwordAuthentication" ] [  "services" "openssh" "settings" "PasswordAuthentication" ])
(mkRenamedOptionModule [ "services" "openssh" "useDns" ] [  "services" "openssh" "settings" "UseDns" ])
(mkRenamedOptionModule [ "services" "openssh" "permitRootLogin" ] [  "services" "openssh" "settings" "PermitRootLogin" ])

* updated doc
* regen doc
Diffstat (limited to 'nixos/doc/manual/configuration')
-rw-r--r--nixos/doc/manual/configuration/ssh.section.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/nixos/doc/manual/configuration/ssh.section.md b/nixos/doc/manual/configuration/ssh.section.md
index cba81eb43f49..9e239a848178 100644
--- a/nixos/doc/manual/configuration/ssh.section.md
+++ b/nixos/doc/manual/configuration/ssh.section.md
@@ -8,7 +8,7 @@ services.openssh.enable = true;
 
 By default, root logins using a password are disallowed. They can be
 disabled entirely by setting
-[](#opt-services.openssh.permitRootLogin) to `"no"`.
+[](#opt-services.openssh.settings.PermitRootLogin) to `"no"`.
 
 You can declaratively specify authorised RSA/DSA public keys for a user
 as follows: