~ruther/guix-local

1806a670f06bd745e7e3744046f50bb6f9113d26 — ClĂ©ment Lassieur 9 years ago 563c5d4
services: openssh: Remove deprecated options.

* gnu/services/ssh.scm (openssh-config-file): Remove them.
(<openssh-configuration>)[rsa-authentication?]: Remove it.
(<openssh-configuration>)[protocol-number]: Remove it.
* doc/guix.texi (Networking Services): Remove them.

Signed-off-by: Danny Milosavljevic <dannym@scratchpost.org>
2 files changed, 0 insertions(+), 18 deletions(-)

M doc/guix.texi
M gnu/services/ssh.scm
M doc/guix.texi => doc/guix.texi +0 -8
@@ 9332,19 9332,11 @@ false, users have to use other authentication method.
Authorized public keys are stored in @file{~/.ssh/authorized_keys}.
This is used only by protocol version 2.

@item @code{rsa-authentication?} (default: @code{#t})
When true, users may log in using pure RSA authentication.  When false,
users have to use other means of authentication.  This is used only by
protocol 1.

@item @code{x11-forwarding?} (default: @code{#f})
When true, forwarding of X11 graphical client connections is
enabled---in other words, @command{ssh} options @option{-X} and
@option{-Y} will work.

@item @code{protocol-number} (default: @code{2})
The SSH protocol number to use.

@item @code{challenge-response-authentication?} (default: @code{#f})
Specifies whether challenge response authentication is allowed (e.g. via
PAM).

M gnu/services/ssh.scm => gnu/services/ssh.scm +0 -10
@@ 274,12 274,8 @@ The other options should be self-descriptive."
                            (default #t))
  (public-key-authentication? openssh-configuration-public-key-authentication?
                              (default #t))                         ;Boolean
  (rsa-authentication?   openssh-configuration-rsa-authentication?  ;Boolean
                         (default #t))
  (x11-forwarding?       openssh-configuration-x11-forwarding? ;Boolean
                         (default #f))
  (protocol-number       openssh-configuration-protocol-number ;integer
                         (default 2))
  (challenge-response-authentication? openssh-challenge-response-authentication?
                                      (default #f)) ;Boolean
  (use-pam?              openssh-configuration-use-pam?


@@ 313,9 309,6 @@ The other options should be self-descriptive."
   #~(call-with-output-file #$output
       (lambda (port)
         (display "# Generated by 'openssh-service'.\n" port)
         (format port "Protocol ~a\n"
                 #$(if (eq? (openssh-configuration-protocol-number config) 1)
                       "1" "2"))
         (format port "Port ~a\n"
                 #$(number->string (openssh-configuration-port-number config)))
         (format port "PermitRootLogin ~a\n"


@@ 332,9 325,6 @@ The other options should be self-descriptive."
         (format port "PubkeyAuthentication ~a\n"
                 #$(if (openssh-configuration-public-key-authentication? config)
                       "yes" "no"))
         (format port "RSAAuthentication ~a\n"
                 #$(if (openssh-configuration-rsa-authentication? config)
                       "yes" "no"))
         (format port "X11Forwarding ~a\n"
                 #$(if (openssh-configuration-x11-forwarding? config)
                       "yes" "no"))