infrastructure/hosts/kinda.sus.lol/sftp_jail.nix

11 lines
196 B
Nix

{
services.openssh.extraConfig = ''
Match Group sftponly
ChrootDirectory /sftp_jail
ForceCommand internal-sftp
AllowTcpForwarding no
'';
users.groups.sftponly = {};
}