mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2024-11-07 15:36:20 -05:00
services: openssh: Remove deprecated options.
* gnu/services/ssh.scm (openssh-config-file): Remove them. (<openssh-configuration>)[rsa-authentication?]: Remove it. (<openssh-configuration>)[protocol-number]: Remove it. * doc/guix.texi (Networking Services): Remove them. Signed-off-by: Danny Milosavljevic <dannym@scratchpost.org>
This commit is contained in:
parent
563c5d42c9
commit
1806a670f0
2 changed files with 0 additions and 18 deletions
|
@ -9332,19 +9332,11 @@ false, users have to use other authentication method.
|
|||
Authorized public keys are stored in @file{~/.ssh/authorized_keys}.
|
||||
This is used only by protocol version 2.
|
||||
|
||||
@item @code{rsa-authentication?} (default: @code{#t})
|
||||
When true, users may log in using pure RSA authentication. When false,
|
||||
users have to use other means of authentication. This is used only by
|
||||
protocol 1.
|
||||
|
||||
@item @code{x11-forwarding?} (default: @code{#f})
|
||||
When true, forwarding of X11 graphical client connections is
|
||||
enabled---in other words, @command{ssh} options @option{-X} and
|
||||
@option{-Y} will work.
|
||||
|
||||
@item @code{protocol-number} (default: @code{2})
|
||||
The SSH protocol number to use.
|
||||
|
||||
@item @code{challenge-response-authentication?} (default: @code{#f})
|
||||
Specifies whether challenge response authentication is allowed (e.g. via
|
||||
PAM).
|
||||
|
|
|
@ -274,12 +274,8 @@ (define-record-type* <openssh-configuration>
|
|||
(default #t))
|
||||
(public-key-authentication? openssh-configuration-public-key-authentication?
|
||||
(default #t)) ;Boolean
|
||||
(rsa-authentication? openssh-configuration-rsa-authentication? ;Boolean
|
||||
(default #t))
|
||||
(x11-forwarding? openssh-configuration-x11-forwarding? ;Boolean
|
||||
(default #f))
|
||||
(protocol-number openssh-configuration-protocol-number ;integer
|
||||
(default 2))
|
||||
(challenge-response-authentication? openssh-challenge-response-authentication?
|
||||
(default #f)) ;Boolean
|
||||
(use-pam? openssh-configuration-use-pam?
|
||||
|
@ -313,9 +309,6 @@ (define (openssh-config-file config)
|
|||
#~(call-with-output-file #$output
|
||||
(lambda (port)
|
||||
(display "# Generated by 'openssh-service'.\n" port)
|
||||
(format port "Protocol ~a\n"
|
||||
#$(if (eq? (openssh-configuration-protocol-number config) 1)
|
||||
"1" "2"))
|
||||
(format port "Port ~a\n"
|
||||
#$(number->string (openssh-configuration-port-number config)))
|
||||
(format port "PermitRootLogin ~a\n"
|
||||
|
@ -332,9 +325,6 @@ (define (openssh-config-file config)
|
|||
(format port "PubkeyAuthentication ~a\n"
|
||||
#$(if (openssh-configuration-public-key-authentication? config)
|
||||
"yes" "no"))
|
||||
(format port "RSAAuthentication ~a\n"
|
||||
#$(if (openssh-configuration-rsa-authentication? config)
|
||||
"yes" "no"))
|
||||
(format port "X11Forwarding ~a\n"
|
||||
#$(if (openssh-configuration-x11-forwarding? config)
|
||||
"yes" "no"))
|
||||
|
|
Loading…
Reference in a new issue