{ config, lib, pkgs, ... }: with lib; let cfg = config.services.xrdp; confDir = pkgs.runCommand "xrdp.conf" { } '' mkdir $out cp ${cfg.package}/etc/xrdp/{km-*,xrdp,sesman,xrdp_keyboard}.ini $out cat > $out/startwm.sh < # xrdp can run X11 program even if "services.xserver.enable = false" environment.pathsToLink = [ "/etc/xdg" "/share/xdg" "/share/applications" "/share/icons" "/share/pixmaps" ]; fonts.enableDefaultFonts = mkDefault true; systemd = { services.xrdp = { wantedBy = [ "multi-user.target" ]; after = [ "network.target" ]; description = "xrdp daemon"; requires = [ "xrdp-sesman.service" ]; preStart = '' # prepare directory for unix sockets (the sockets will be owned by loggedinuser:xrdp) mkdir -p /tmp/.xrdp || true chown xrdp:xrdp /tmp/.xrdp chmod 3777 /tmp/.xrdp # generate a self-signed certificate if [ ! -s ${cfg.sslCert} -o ! -s ${cfg.sslKey} ]; then mkdir -p $(dirname ${cfg.sslCert}) || true mkdir -p $(dirname ${cfg.sslKey}) || true ${pkgs.openssl.bin}/bin/openssl req -x509 -newkey rsa:2048 -sha256 -nodes -days 365 \ -subj /C=US/ST=CA/L=Sunnyvale/O=xrdp/CN=www.xrdp.org \ -config ${cfg.package}/share/xrdp/openssl.conf \ -keyout ${cfg.sslKey} -out ${cfg.sslCert} chown root:xrdp ${cfg.sslKey} ${cfg.sslCert} chmod 440 ${cfg.sslKey} ${cfg.sslCert} fi if [ ! -s /var/run/xrdp/rsakeys.ini ]; then mkdir -p /var/run/xrdp ${cfg.package}/bin/xrdp-keygen xrdp /var/run/xrdp/rsakeys.ini fi ''; serviceConfig = { User = "xrdp"; Group = "xrdp"; PermissionsStartOnly = true; ExecStart = "${cfg.package}/bin/xrdp --nodaemon --port ${toString cfg.port} --config ${confDir}/xrdp.ini"; }; }; services.xrdp-sesman = { wantedBy = [ "multi-user.target" ]; after = [ "network.target" ]; description = "xrdp session manager"; restartIfChanged = false; # do not restart on "nixos-rebuild switch". like "display-manager", it can have many interactive programs as children serviceConfig = { ExecStart = "${cfg.package}/bin/xrdp-sesman --nodaemon --config ${confDir}/sesman.ini"; ExecStop = "${pkgs.coreutils}/bin/kill -INT $MAINPID"; }; }; }; users.users.xrdp = { description = "xrdp daemon user"; isSystemUser = true; group = "xrdp"; }; users.groups.xrdp = {}; security.pam.services.xrdp-sesman = { allowNullPassword = true; startSession = true; }; }; }