mirror of
https://github.com/linuxserver/docker-openssh-server.git
synced 2026-01-19 11:21:51 +08:00
fix typo
This commit is contained in:
parent
ede4f54228
commit
5229d2f2fe
@ -114,6 +114,7 @@ services:
|
||||
- PUBLIC_KEY=yourpublickey #optional
|
||||
- PUBLIC_KEY_FILE=/path/to/file #optional
|
||||
- PUBLIC_KEY_DIR=/path/to/directory/containing/_only_/pubkeys #optional
|
||||
- PUBLIC_KEY_URL=https://github.com/username.keys #optional
|
||||
- SUDO_ACCESS=false #optional
|
||||
- PASSWORD_ACCESS=false #optional
|
||||
- USER_PASSWORD=password #optional
|
||||
@ -138,6 +139,7 @@ docker run -d \
|
||||
-e PUBLIC_KEY=yourpublickey `#optional` \
|
||||
-e PUBLIC_KEY_FILE=/path/to/file `#optional` \
|
||||
-e PUBLIC_KEY_DIR=/path/to/directory/containing/_only_/pubkeys `#optional` \
|
||||
-e PUBLIC_KEY_URL=https://github.com/username.keys `#optional` \
|
||||
-e SUDO_ACCESS=false `#optional` \
|
||||
-e PASSWORD_ACCESS=false `#optional` \
|
||||
-e USER_PASSWORD=password `#optional` \
|
||||
@ -163,6 +165,7 @@ Container images are configured using parameters passed at runtime (such as thos
|
||||
| `-e PUBLIC_KEY=yourpublickey` | Optional ssh public key, which will automatically be added to authorized_keys. |
|
||||
| `-e PUBLIC_KEY_FILE=/path/to/file` | Optionally specify a file containing the public key (works with docker secrets). |
|
||||
| `-e PUBLIC_KEY_DIR=/path/to/directory/containing/_only_/pubkeys` | Optionally specify a directory containing the public keys (works with docker secrets). |
|
||||
| `-e PUBLIC_KEY_URL=https://github.com/username.keys` | Optionally specify a URL containing the public key. |
|
||||
| `-e SUDO_ACCESS=false` | Set to `true` to allow `linuxserver.io`, the ssh user, sudo access. Without `USER_PASSWORD` set, this will allow passwordless sudo access. |
|
||||
| `-e PASSWORD_ACCESS=false` | Set to `true` to allow user/password ssh access. You will want to set `USER_PASSWORD` or `USER_PASSWORD_FILE` as well. |
|
||||
| `-e USER_PASSWORD=password` | Optionally set a sudo password for `linuxserver.io`, the ssh user. If this or `USER_PASSWORD_FILE` are not set but `SUDO_ACCESS` is set to true, the user will have passwordless sudo access. |
|
||||
@ -279,6 +282,7 @@ Once registered you can define the dockerfile to use with `-f Dockerfile.aarch64
|
||||
|
||||
## Versions
|
||||
|
||||
* **16.11.21:** - Add PUBLIC_KEY_URL option
|
||||
* **28.06.21:** - Rebasing to alpine 3.14. Add support for PAM.
|
||||
* **10.02.21:** - Rebasing to alpine 3.13. Add openssh-client for scp.
|
||||
* **21.10.20:** - Implement s6-log for openssh, which adds local timestamps to logs and can be used with a log parser like fail2ban.
|
||||
|
||||
@ -44,7 +44,7 @@ opt_param_env_vars:
|
||||
- { env_var: "PUBLIC_KEY", env_value: "yourpublickey", desc: "Optional ssh public key, which will automatically be added to authorized_keys."}
|
||||
- { env_var: "PUBLIC_KEY_FILE", env_value: "/path/to/file", desc: "Optionally specify a file containing the public key (works with docker secrets)."}
|
||||
- { env_var: "PUBLIC_KEY_DIR", env_value: "/path/to/directory/containing/_only_/pubkeys", desc: "Optionally specify a directory containing the public keys (works with docker secrets)."}
|
||||
- { env_var: "PUBLIC_KEY_URL", env_vaue: "https://github.com/username.keys", desc: "Optionally specify a URL containing the public key."}
|
||||
- { env_var: "PUBLIC_KEY_URL", env_value: "https://github.com/username.keys", desc: "Optionally specify a URL containing the public key."}
|
||||
- { env_var: "SUDO_ACCESS", env_value: "false", desc: "Set to `true` to allow `linuxserver.io`, the ssh user, sudo access. Without `USER_PASSWORD` set, this will allow passwordless sudo access."}
|
||||
- { env_var: "PASSWORD_ACCESS", env_value: "false", desc: "Set to `true` to allow user/password ssh access. You will want to set `USER_PASSWORD` or `USER_PASSWORD_FILE` as well."}
|
||||
- { env_var: "USER_PASSWORD", env_value: "password", desc: "Optionally set a sudo password for `linuxserver.io`, the ssh user. If this or `USER_PASSWORD_FILE` are not set but `SUDO_ACCESS` is set to true, the user will have passwordless sudo access."}
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user