Skip to content

Commit

Permalink
nixos/modules: users.(extraUsers|extraGroup->users|group)
Browse files Browse the repository at this point in the history
  • Loading branch information
flokli committed Jun 30, 2018
1 parent 89d5d19 commit fff5923
Show file tree
Hide file tree
Showing 295 changed files with 512 additions and 512 deletions.
4 changes: 2 additions & 2 deletions nixos/modules/config/ldap.nix
Original file line number Diff line number Diff line change
Expand Up @@ -215,11 +215,11 @@ in
);

users = mkIf cfg.daemon.enable {
extraGroups.nslcd = {
groups.nslcd = {
gid = config.ids.gids.nslcd;
};

extraUsers.nslcd = {
users.nslcd = {
uid = config.ids.uids.nslcd;
description = "nslcd user.";
group = "nslcd";
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/config/pulseaudio.nix
Original file line number Diff line number Diff line change
Expand Up @@ -264,7 +264,7 @@ in {
})

(mkIf systemWide {
users.extraUsers.pulse = {
users.users.pulse = {
# For some reason, PulseAudio wants UID == GID.
uid = assert uid == gid; uid;
group = "pulse";
Expand All @@ -274,7 +274,7 @@ in {
createHome = true;
};

users.extraGroups.pulse.gid = gid;
users.groups.pulse.gid = gid;

systemd.services.pulseaudio = {
description = "PulseAudio System-Wide Server";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/hardware/nitrokey.nix
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,6 @@ in
{ inherit (cfg) group; }
))
];
users.extraGroups."${cfg.group}" = {};
users.groups."${cfg.group}" = {};
};
}
2 changes: 1 addition & 1 deletion nixos/modules/misc/locate.nix
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ in {
};

config = mkIf cfg.enable {
users.extraGroups = mkIf isMLocate { mlocate = {}; };
users.groups = mkIf isMLocate { mlocate = {}; };

security.wrappers = mkIf isMLocate {
locate = {
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/profiles/demo.nix
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
{
imports = [ ./graphical.nix ];

users.extraUsers.demo =
users.users.demo =
{ isNormalUser = true;
description = "Demo user account";
extraGroups = [ "wheel" ];
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/programs/adb.nix
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ with lib;
description = ''
Whether to configure system to use Android Debug Bridge (adb).
To grant access to a user, it must be part of adbusers group:
<code>users.extraUsers.alice.extraGroups = ["adbusers"];</code>
<code>users.users.alice.extraGroups = ["adbusers"];</code>
'';
relatedPackages = [ ["androidenv" "platformTools"] ];
};
Expand All @@ -25,6 +25,6 @@ with lib;
config = mkIf config.programs.adb.enable {
services.udev.packages = [ pkgs.android-udev-rules ];
environment.systemPackages = [ pkgs.androidenv.platformTools ];
users.extraGroups.adbusers = {};
users.groups.adbusers = {};
};
}
4 changes: 2 additions & 2 deletions nixos/modules/programs/gphoto2.nix
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ with lib;
Whether to configure system to use gphoto2.
To grant digital camera access to a user, the user must
be part of the camera group:
<code>users.extraUsers.alice.extraGroups = ["camera"];</code>
<code>users.users.alice.extraGroups = ["camera"];</code>
'';
};
};
Expand All @@ -25,6 +25,6 @@ with lib;
config = mkIf config.programs.gphoto2.enable {
services.udev.packages = [ pkgs.libgphoto2 ];
environment.systemPackages = [ pkgs.gphoto2 ];
users.extraGroups.camera = {};
users.groups.camera = {};
};
}
2 changes: 1 addition & 1 deletion nixos/modules/programs/sway.nix
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ in {
permissions = "u+rx,g+rx";
};

users.extraGroups.sway = {};
users.groups.sway = {};
security.pam.services.swaylock = {};

hardware.opengl.enable = mkDefault true;
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/programs/wireshark.nix
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ in {

config = mkIf cfg.enable {
environment.systemPackages = [ wireshark ];
users.extraGroups.wireshark = {};
users.groups.wireshark = {};

security.wrappers.dumpcap = {
source = "${wireshark}/bin/dumpcap";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/security/pam_mount.nix
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ in
target = "security/pam_mount.conf.xml";
source =
let
extraUserVolumes = filterAttrs (n: u: u.cryptHomeLuks != null) config.users.extraUsers;
extraUserVolumes = filterAttrs (n: u: u.cryptHomeLuks != null) config.users.users;
userVolumeEntry = user: "<volume user=\"${user.name}\" path=\"${user.cryptHomeLuks}\" mountpoint=\"${user.home}\" />\n";
in
pkgs.writeText "pam_mount.conf.xml" ''
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/security/polkit.nix
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ in
rm -rf /var/lib/{polkit-1,PolicyKit}
'';

users.extraUsers.polkituser = {
users.users.polkituser = {
description = "PolKit daemon";
uid = config.ids.uids.polkituser;
};
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/security/rtkit.nix
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ with lib;

services.dbus.packages = [ pkgs.rtkit ];

users.extraUsers = singleton
users.users = singleton
{ name = "rtkit";
uid = config.ids.uids.rtkit;
description = "RealtimeKit daemon";
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/admin/oxidized.nix
Original file line number Diff line number Diff line change
Expand Up @@ -83,8 +83,8 @@ in
};

config = mkIf cfg.enable {
users.extraGroups.${cfg.group} = { };
users.extraUsers.${cfg.user} = {
users.groups.${cfg.group} = { };
users.users.${cfg.user} = {
description = "Oxidized service user";
group = cfg.group;
home = cfg.dataDir;
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/amqp/activemq/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -93,13 +93,13 @@ in {
};

config = mkIf cfg.enable {
users.extraUsers.activemq = {
users.users.activemq = {
description = "ActiveMQ server user";
group = "activemq";
uid = config.ids.uids.activemq;
};

users.extraGroups.activemq.gid = config.ids.gids.activemq;
users.groups.activemq.gid = config.ids.gids.activemq;

systemd.services.activemq_init = {
wantedBy = [ "activemq.service" ];
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/amqp/rabbitmq.nix
Original file line number Diff line number Diff line change
Expand Up @@ -83,15 +83,15 @@ in {

environment.systemPackages = [ pkgs.rabbitmq_server ];

users.extraUsers.rabbitmq = {
users.users.rabbitmq = {
description = "RabbitMQ server user";
home = "${cfg.dataDir}";
createHome = true;
group = "rabbitmq";
uid = config.ids.uids.rabbitmq;
};

users.extraGroups.rabbitmq.gid = config.ids.gids.rabbitmq;
users.groups.rabbitmq.gid = config.ids.gids.rabbitmq;

systemd.services.rabbitmq = {
description = "RabbitMQ Server";
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/audio/liquidsoap.nix
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ in

config = mkIf (builtins.length streams != 0) {

users.extraUsers.liquidsoap = {
users.users.liquidsoap = {
uid = config.ids.uids.liquidsoap;
group = "liquidsoap";
extraGroups = [ "audio" ];
Expand All @@ -66,7 +66,7 @@ in
createHome = true;
};

users.extraGroups.liquidsoap.gid = config.ids.gids.liquidsoap;
users.groups.liquidsoap.gid = config.ids.gids.liquidsoap;

systemd.services = builtins.listToAttrs ( map streamService streams );
};
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/audio/mopidy.nix
Original file line number Diff line number Diff line change
Expand Up @@ -93,15 +93,15 @@ in {
};
};

users.extraUsers.mopidy = {
users.users.mopidy = {
inherit uid;
group = "mopidy";
extraGroups = [ "audio" ];
description = "Mopidy daemon user";
home = "${cfg.dataDir}";
};

users.extraGroups.mopidy.gid = gid;
users.groups.mopidy.gid = gid;

};

Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/audio/mpd.nix
Original file line number Diff line number Diff line change
Expand Up @@ -184,7 +184,7 @@ in {
};
};

users.extraUsers = optionalAttrs (cfg.user == name) (singleton {
users.users = optionalAttrs (cfg.user == name) (singleton {
inherit uid;
inherit name;
group = cfg.group;
Expand All @@ -193,7 +193,7 @@ in {
home = "${cfg.dataDir}";
});

users.extraGroups = optionalAttrs (cfg.group == name) (singleton {
users.groups = optionalAttrs (cfg.group == name) (singleton {
inherit name;
gid = gid;
});
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/audio/squeezelite.nix
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ in {
};
};

users.extraUsers.squeezelite= {
users.users.squeezelite= {
inherit uid;
group = "nogroup";
extraGroups = [ "audio" ];
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/backup/bacula.nix
Original file line number Diff line number Diff line change
Expand Up @@ -397,7 +397,7 @@ in {

environment.systemPackages = [ pkgs.bacula ];

users.extraUsers.bacula = {
users.users.bacula = {
group = "bacula";
uid = config.ids.uids.bacula;
home = "${libDir}";
Expand All @@ -406,6 +406,6 @@ in {
shell = "${pkgs.bash}/bin/bash";
};

users.extraGroups.bacula.gid = config.ids.gids.bacula;
users.groups.bacula.gid = config.ids.gids.bacula;
};
}
4 changes: 2 additions & 2 deletions nixos/modules/services/backup/duplicati.nix
Original file line number Diff line number Diff line change
Expand Up @@ -44,13 +44,13 @@ in
};
};

users.extraUsers.duplicati = {
users.users.duplicati = {
uid = config.ids.uids.duplicati;
home = "/var/lib/duplicati";
createHome = true;
group = "duplicati";
};
users.extraGroups.duplicati.gid = config.ids.gids.duplicati;
users.groups.duplicati.gid = config.ids.gids.duplicati;

};
}
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/backup/mysql-backup.nix
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ in
};

config = mkIf cfg.enable {
users.extraUsers = optionalAttrs (cfg.user == defaultUser) (singleton
users.users = optionalAttrs (cfg.user == defaultUser) (singleton
{ name = defaultUser;
isSystemUser = true;
createHome = false;
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/backup/restic-rest-server.nix
Original file line number Diff line number Diff line change
Expand Up @@ -95,13 +95,13 @@ in
};
};

users.extraUsers.restic = {
users.users.restic = {
group = "restic";
home = cfg.dataDir;
createHome = true;
uid = config.ids.uids.restic;
};

users.extraGroups.restic.gid = config.ids.uids.restic;
users.groups.restic.gid = config.ids.uids.restic;
};
}
4 changes: 2 additions & 2 deletions nixos/modules/services/cluster/kubernetes/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -1145,7 +1145,7 @@ in {
];

environment.systemPackages = [ cfg.package ];
users.extraUsers = singleton {
users.users = singleton {
name = "kubernetes";
uid = config.ids.uids.kubernetes;
description = "Kubernetes user";
Expand All @@ -1154,7 +1154,7 @@ in {
home = cfg.dataDir;
createHome = true;
};
users.extraGroups.kubernetes.gid = config.ids.gids.kubernetes;
users.groups.kubernetes.gid = config.ids.gids.kubernetes;

# dns addon is enabled by default
services.kubernetes.addons.dns.enable = mkDefault true;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -191,11 +191,11 @@ in {
};

config = mkIf cfg.enable {
users.extraGroups = optional (cfg.group == "buildbot") {
users.groups = optional (cfg.group == "buildbot") {
name = "buildbot";
};

users.extraUsers = optional (cfg.user == "buildbot") {
users.users = optional (cfg.user == "buildbot") {
name = "buildbot";
description = "Buildbot User.";
isNormalUser = true;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -84,11 +84,11 @@ in {
};

config = mkIf cfg.enable {
users.extraGroups = optional (cfg.group == "bbworker") {
users.groups = optional (cfg.group == "bbworker") {
name = "bbworker";
};

users.extraUsers = optional (cfg.user == "bbworker") {
users.users = optional (cfg.user == "bbworker") {
name = "bbworker";
description = "Buildbot Worker User.";
isNormalUser = true;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -185,7 +185,7 @@ in
};

config = mkIf config.services.buildkite-agent.enable {
users.extraUsers.buildkite-agent =
users.users.buildkite-agent =
{ name = "buildkite-agent";
home = cfg.dataDir;
createHome = true;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -134,14 +134,14 @@ in
# Make the gitlab-runner command availabe so users can query the runner
environment.systemPackages = [ cfg.package ];

users.extraUsers.gitlab-runner = {
users.users.gitlab-runner = {
group = "gitlab-runner";
extraGroups = optional hasDocker "docker";
uid = config.ids.uids.gitlab-runner;
home = cfg.workDir;
createHome = true;
};

users.extraGroups.gitlab-runner.gid = config.ids.gids.gitlab-runner;
users.groups.gitlab-runner.gid = config.ids.gids.gitlab-runner;
};
}
Original file line number Diff line number Diff line change
Expand Up @@ -135,12 +135,12 @@ in {
};

config = mkIf cfg.enable {
users.extraGroups = optional (cfg.group == "gocd-agent") {
users.groups = optional (cfg.group == "gocd-agent") {
name = "gocd-agent";
gid = config.ids.gids.gocd-agent;
};

users.extraUsers = optional (cfg.user == "gocd-agent") {
users.users = optional (cfg.user == "gocd-agent") {
name = "gocd-agent";
description = "gocd-agent user";
createHome = true;
Expand Down

0 comments on commit fff5923

Please sign in to comment.