+2
doc/manpage-urls.json
+2
doc/manpage-urls.json
···"systemd-socket-activate(1)": "https://www.freedesktop.org/software/systemd/man/systemd-socket-activate.html","systemd-socket-proxyd(8)": "https://www.freedesktop.org/software/systemd/man/systemd-socket-proxyd.html","systemd-soft-reboot.service(8)": "https://www.freedesktop.org/software/systemd/man/systemd-soft-reboot.service.html",+"systemd-ssh-generator(8)": "https://www.freedesktop.org/software/systemd/man/systemd-ssh-generator.html",+"systemd-ssh-proxy(1)": "https://www.freedesktop.org/software/systemd/man/systemd-ssh-proxy.html","systemd-stdio-bridge(1)": "https://www.freedesktop.org/software/systemd/man/systemd-stdio-bridge.html",
+13
nixos/doc/manual/release-notes/rl-2505.section.md
+13
nixos/doc/manual/release-notes/rl-2505.section.md
···- GOverlay has been updated to 1.2, please check the [upstream changelog](https://github.com/benjamimgois/goverlay/releases) for more details.+- You can ssh into VMs without any networking configuration if your hypervisor configures the vm to support AF_VSOCK.+- An SSH key for the root user can be provisioned using the `ssh.authorized_keys.root` systemd credential.+This can be useful for booting an installation image and providing the SSH key with an smbios string.+- SSH can be used for suid-less privilege escalation on the local system without having to rely on networking:+- systemd's {manpage}`systemd-ssh-proxy(1)` is enabled by default. It can be disabled using [`programs.ssh.systemd-ssh-proxy.enable`](#opt-programs.ssh.systemd-ssh-proxy.enable).+- SSH host key generation has been separated into the dedicated systemd service sshd-keygen.service.- [`services.mongodb`](#opt-services.mongodb.enable) is now compatible with the `mongodb-ce` binary package. To make use of it, set [`services.mongodb.package`](#opt-services.mongodb.package) to `pkgs.mongodb-ce`.
+14
nixos/modules/programs/ssh.nix
+14
nixos/modules/programs/ssh.nix
······
+79
-63
nixos/modules/services/networking/ssh/sshd.nix
+79
-63
nixos/modules/services/networking/ssh/sshd.nix
···+"/root/.ssh/authorized_keys"."f^" = { user = "root"; group = ":root"; mode = ":600"; argument = "ssh.authorized_keys.root"; };···
+6
-1
nixos/modules/system/boot/systemd.nix
+6
-1
nixos/modules/system/boot/systemd.nix
···# Doesn't contain systemd itself - everything works so it seems to use the compiled-in value for its tools
+1
nixos/tests/all-tests.nix
+1
nixos/tests/all-tests.nix
···
-3
nixos/tests/openssh.nix
-3
nixos/tests/openssh.nix
······
+76
nixos/tests/systemd-ssh-proxy.nix
+76
nixos/tests/systemd-ssh-proxy.nix
···+script = "${lib.getExe qemu} --nographic -smp 1 -m 512 -cdrom ${iso}/iso/nixos.iso -device vhost-vsock-pci,guest-cid=3 -smbios type=11,value=\"io.systemd.credential:ssh.authorized_keys.root=${snakeOilEd25519PublicKey}\"";+virthost.succeed("sudo --user=nixos ssh -o StrictHostKeyChecking=no -o IdentitiesOnly=yes -i /home/nixos/.ssh/id_ed25519 root@.host whoami | grep root")
+32
pkgs/os-specific/linux/systemd/0019-meson-Don-t-link-ssh-dropins.patch
+32
pkgs/os-specific/linux/systemd/0019-meson-Don-t-link-ssh-dropins.patch
···+-conf.set10('LINK_SSH_PROXY_DROPIN', sshconfdir != 'no' and not sshconfdir.startswith('/usr/'))+-conf.set10('LINK_SSHD_USERDB_DROPIN', sshdconfdir != 'no' and not sshdconfdir.startswith('/usr/'))+conf.set10('CREATE_SSHDPRIVSEPDIR', sshdprivsepdir != 'no' and not sshdprivsepdir.startswith('/usr/'))
pkgs/os-specific/linux/systemd/0019-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch
pkgs/os-specific/linux/systemd/0021-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch
pkgs/os-specific/linux/systemd/0019-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch
pkgs/os-specific/linux/systemd/0021-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch
+25
pkgs/os-specific/linux/systemd/0020-install-unit_file_exists_full-follow-symlinks.patch
+25
pkgs/os-specific/linux/systemd/0020-install-unit_file_exists_full-follow-symlinks.patch
···+@@ -3217,7 +3217,7 @@ int unit_file_exists_full(RuntimeScope scope, const LookupPaths *lp, const char
+7
-3
pkgs/os-specific/linux/systemd/default.nix
+7
-3
pkgs/os-specific/linux/systemd/default.nix
···./0018-Revert-bootctl-update-list-remove-all-instances-of-s.patch # https://github.com/systemd/systemd/issues/33392···