treewide: Switch to system users

wip/yesman
Janne Heß 5 years ago
parent d4f085036b
commit d6c08776ba
  1. 1
      nixos/modules/programs/x2goserver.nix
  2. 1
      nixos/modules/services/admin/oxidized.nix
  3. 1
      nixos/modules/services/audio/jack.nix
  4. 5
      nixos/modules/services/backup/automysqlbackup.nix
  5. 2
      nixos/modules/services/backup/borgbackup.nix
  6. 1
      nixos/modules/services/continuous-integration/buildkite-agent.nix
  7. 5
      nixos/modules/services/databases/redis.nix
  8. 1
      nixos/modules/services/databases/rethinkdb.nix
  9. 1
      nixos/modules/services/editors/infinoted.nix
  10. 1
      nixos/modules/services/hardware/trezord.nix
  11. 1
      nixos/modules/services/hardware/usbmuxd.nix
  12. 1
      nixos/modules/services/hardware/vdr.nix
  13. 1
      nixos/modules/services/mail/mailhog.nix
  14. 1
      nixos/modules/services/misc/airsonic.nix
  15. 6
      nixos/modules/services/misc/docker-registry.nix
  16. 5
      nixos/modules/services/misc/errbot.nix
  17. 1
      nixos/modules/services/misc/gitea.nix
  18. 1
      nixos/modules/services/misc/gollum.nix
  19. 5
      nixos/modules/services/misc/jellyfin.nix
  20. 1
      nixos/modules/services/misc/osrm.nix
  21. 1
      nixos/modules/services/monitoring/collectd.nix
  22. 1
      nixos/modules/services/monitoring/fusion-inventory.nix
  23. 1
      nixos/modules/services/monitoring/netdata.nix
  24. 1
      nixos/modules/services/monitoring/zabbix-agent.nix
  25. 1
      nixos/modules/services/networking/bitcoind.nix
  26. 2
      nixos/modules/services/networking/dnscache.nix
  27. 1
      nixos/modules/services/networking/dnscrypt-wrapper.nix
  28. 1
      nixos/modules/services/networking/hans.nix
  29. 1
      nixos/modules/services/networking/matterbridge.nix
  30. 1
      nixos/modules/services/networking/morty.nix
  31. 1
      nixos/modules/services/networking/nghttpx/default.nix
  32. 1
      nixos/modules/services/networking/owamp.nix
  33. 1
      nixos/modules/services/networking/thelounge.nix
  34. 2
      nixos/modules/services/networking/tinydns.nix
  35. 2
      nixos/modules/services/scheduling/marathon.nix
  36. 5
      nixos/modules/services/security/bitwarden_rs/default.nix
  37. 1
      nixos/modules/services/security/oauth2_proxy.nix
  38. 1
      nixos/modules/services/torrent/magnetico.nix
  39. 1
      nixos/modules/services/web-apps/codimd.nix
  40. 1
      nixos/modules/services/web-apps/frab.nix
  41. 5
      nixos/modules/services/web-apps/limesurvey.nix
  42. 5
      nixos/modules/services/web-apps/mediawiki.nix
  43. 6
      nixos/modules/services/web-apps/moodle.nix
  44. 1
      nixos/modules/services/web-apps/virtlyst.nix
  45. 5
      nixos/modules/services/web-apps/wordpress.nix
  46. 5
      nixos/modules/services/web-servers/hitch/default.nix
  47. 1
      nixos/modules/services/web-servers/traefik.nix
  48. 1
      nixos/modules/services/web-servers/unit/default.nix

@ -69,6 +69,7 @@ in {
users.users.x2go = {
home = "/var/lib/x2go/db";
group = "x2go";
isSystemUser = true;
};
security.wrappers.x2gosqliteWrapper = {

@ -89,6 +89,7 @@ in
group = cfg.group;
home = cfg.dataDir;
createHome = true;
isSystemUser = true;
};
systemd.services.oxidized = {

@ -223,6 +223,7 @@ in {
group = "jackaudio";
extraGroups = [ "audio" ];
description = "JACK Audio system service user";
isSystemUser = true;
};
# http://jackaudio.org/faq/linux_rt_config.html
security.pam.loginLimits = [

@ -99,7 +99,10 @@ in
environment.systemPackages = [ pkg ];
users.users.${user}.group = group;
users.users.${user} = {
group = group;
isSystemUser = true;
};
users.groups.${group} = { };
systemd.tmpfiles.rules = [

@ -106,7 +106,7 @@ let
nameValuePair "borgbackup-job-${name}" (stringAfter [ "users" ] (''
# Eensure that the home directory already exists
# We can't assert createHome == true because that's not the case for root
cd "${config.users.users.${cfg.user}.home}"
cd "${config.users.users.${cfg.user}.home}"
${install} -d .config/borg
${install} -d .cache/borg
'' + optionalString (isLocalPath cfg.repo) ''

@ -191,6 +191,7 @@ in
createHome = true;
description = "Buildkite agent user";
extraGroups = [ "keys" ];
isSystemUser = true;
};
environment.systemPackages = [ cfg.package ];

@ -194,7 +194,10 @@ in
allowedTCPPorts = [ cfg.port ];
};
users.users.redis.description = "Redis database user";
users.users.redis = {
description = "Redis database user";
isSystemUser = true;
};
environment.systemPackages = [ cfg.package ];

@ -99,6 +99,7 @@ in
users.users.rethinkdb = mkIf (cfg.user == "rethinkdb")
{ name = "rethinkdb";
description = "RethinkDB server user";
isSystemUser = true;
};
users.groups = optionalAttrs (cfg.group == "rethinkdb") (singleton

@ -115,6 +115,7 @@ in {
{ name = "infinoted";
description = "Infinoted user";
group = cfg.group;
isSystemUser = true;
};
users.groups = optional (cfg.group == "infinoted")
{ name = "infinoted";

@ -74,6 +74,7 @@ in {
users.users.trezord = {
group = "trezord";
description = "Trezor bridge daemon user";
isSystemUser = true;
};
users.groups.trezord = {};

@ -47,6 +47,7 @@ in
name = cfg.user;
description = "usbmuxd user";
group = cfg.group;
isSystemUser = true;
};
users.groups = optional (cfg.group == defaultUserGroup) {

@ -66,6 +66,7 @@ in {
users.users.vdr = {
group = "vdr";
home = libDir;
isSystemUser = true;
};
users.groups.vdr = {};

@ -27,6 +27,7 @@ in {
users.users.mailhog = {
name = cfg.user;
description = "MailHog service user";
isSystemUser = true;
};
systemd.services.mailhog = {

@ -148,6 +148,7 @@ in {
name = cfg.user;
home = cfg.home;
createHome = true;
isSystemUser = true;
};
};
}

@ -145,11 +145,13 @@ in {
};
users.users.docker-registry =
if cfg.storagePath != null
(if cfg.storagePath != null
then {
createHome = true;
home = cfg.storagePath;
}
else {};
else {}) // {
isSystemUser = true;
};
};
}

@ -76,7 +76,10 @@ in {
};
config = mkIf (cfg.instances != {}) {
users.users.errbot.group = "errbot";
users.users.errbot = {
group = "errbot";
isSystemUser = true;
};
users.groups.errbot = {};
systemd.services = mapAttrs' (name: instanceCfg: nameValuePair "errbot-${name}" (

@ -409,6 +409,7 @@ in
home = cfg.stateDir;
useDefaultShell = true;
group = "gitea";
isSystemUser = true;
};
};

@ -71,6 +71,7 @@ in
group = config.users.users.gollum.name;
description = "Gollum user";
createHome = false;
isSystemUser = true;
};
users.groups.gollum = { };

@ -41,7 +41,10 @@ in
};
users.users = mkIf (cfg.user == "jellyfin") {
jellyfin.group = cfg.group;
jellyfin = {
group = cfg.group;
isSystemUser = true;
};
};
users.groups = mkIf (cfg.group == "jellyfin") {

@ -59,6 +59,7 @@ in
group = config.users.users.osrm.name;
description = "OSRM user";
createHome = false;
isSystemUser = true;
};
users.groups.osrm = { };

@ -98,6 +98,7 @@ in {
users.users = optional (cfg.user == "collectd") {
name = "collectd";
isSystemUser = true;
};
};
}

@ -49,6 +49,7 @@ in {
users.users = singleton {
name = "fusion-inventory";
description = "FusionInventory user";
isSystemUser = true;
};
systemd.services.fusion-inventory = {

@ -181,6 +181,7 @@ in {
users.users = optional (cfg.user == defaultUser) {
name = defaultUser;
isSystemUser = true;
};
users.groups = optional (cfg.group == defaultUser) {

@ -131,6 +131,7 @@ in
users.users.${user} = {
description = "Zabbix Agent daemon user";
inherit group;
isSystemUser = true;
};
users.groups.${group} = { };

@ -187,6 +187,7 @@ in {
group = cfg.group;
description = "Bitcoin daemon user";
home = cfg.dataDir;
isSystemUser = true;
};
users.groups.${cfg.group} = {
name = cfg.group;

@ -84,7 +84,7 @@ in {
config = mkIf config.services.dnscache.enable {
environment.systemPackages = [ pkgs.djbdns ];
users.users.dnscache = {};
users.users.dnscache.isSystemUser = true;
systemd.services.dnscache = {
description = "djbdns dnscache server";

@ -142,6 +142,7 @@ in {
description = "dnscrypt-wrapper daemon user";
home = "${dataDir}";
createHome = true;
isSystemUser = true;
};
users.groups.dnscrypt-wrapper = { };

@ -138,6 +138,7 @@ in
users.users = singleton {
name = hansUser;
description = "Hans daemon user";
isSystemUser = true;
};
};

@ -95,6 +95,7 @@ in
users.users = optional (cfg.user == "matterbridge")
{ name = "matterbridge";
group = "matterbridge";
isSystemUser = true;
};
users.groups = optional (cfg.group == "matterbridge")

@ -74,6 +74,7 @@ in
{ description = "Morty user";
createHome = true;
home = "/var/lib/morty";
isSystemUser = true;
};
systemd.services.morty =

@ -96,6 +96,7 @@ in
users.groups.nghttpx = { };
users.users.nghttpx = {
group = config.users.groups.nghttpx.name;
isSystemUser = true;
};

@ -21,6 +21,7 @@ in
name = "owamp";
group = "owamp";
description = "Owamp daemon";
isSystemUser = true;
};
users.groups = singleton {

@ -56,6 +56,7 @@ in {
users.users.thelounge = {
description = "thelounge service user";
group = "thelounge";
isSystemUser = true;
};
users.groups.thelounge = {};
systemd.services.thelounge = {

@ -32,7 +32,7 @@ with lib;
config = mkIf config.services.tinydns.enable {
environment.systemPackages = [ pkgs.djbdns ];
users.users.tinydns = {};
users.users.tinydns.isSystemUser = true;
systemd.services.tinydns = {
description = "djbdns tinydns server";

@ -93,6 +93,6 @@ in {
};
};
users.users.${cfg.user} = { };
users.users.${cfg.user}.isSystemUser = true;
};
}

@ -74,7 +74,10 @@ in {
webVaultEnabled = mkDefault true;
};
users.users.bitwarden_rs = { inherit group; };
users.users.bitwarden_rs = {
inherit group;
isSystemUser = true;
};
users.groups.bitwarden_rs = { };
systemd.services.bitwarden_rs = {

@ -546,6 +546,7 @@ in
users.users.oauth2_proxy = {
description = "OAuth2 Proxy";
isSystemUser = true;
};
systemd.services.oauth2_proxy = {

@ -171,6 +171,7 @@ in {
users.users.magnetico = {
description = "Magnetico daemons user";
isSystemUser = true;
};
systemd.services.magneticod = {

@ -893,6 +893,7 @@ in
extraGroups = cfg.groups;
home = cfg.workDir;
createHome = true;
isSystemUser = true;
};
systemd.services.codimd = {

@ -177,6 +177,7 @@ in
{ name = cfg.user;
group = cfg.group;
home = "${cfg.statePath}";
isSystemUser = true;
}
];

@ -277,7 +277,10 @@ in
systemd.services.httpd.after = optional mysqlLocal "mysql.service" ++ optional pgsqlLocal "postgresql.service";
users.users.${user}.group = group;
users.users.${user} = {
group = group;
isSystemUser = true;
};
};
}

@ -461,7 +461,10 @@ in
systemd.services.httpd.after = optional (cfg.database.createLocally && cfg.database.type == "mysql") "mysql.service";
users.users.${user}.group = group;
users.users.${user} = {
group = group;
isSystemUser = true;
};
environment.systemPackages = [ mediawikiScripts ];
};

@ -309,7 +309,9 @@ in
systemd.services.httpd.after = optional mysqlLocal "mysql.service" ++ optional pgsqlLocal "postgresql.service";
users.users.${user}.group = group;
users.users.${user} = {
group = group;
isSystemUser = true;
};
};
}

@ -54,6 +54,7 @@ in
home = stateDir;
createHome = true;
group = mkIf config.virtualisation.libvirtd.enable "libvirtd";
isSystemUser = true;
};
systemd.services.virtlyst = {

@ -367,7 +367,10 @@ in
})
];
users.users.${user}.group = group;
users.users.${user} = {
group = group;
isSystemUser = true;
};
};
}

@ -102,7 +102,10 @@ with lib;
environment.systemPackages = [ pkgs.hitch ];
users.users.hitch.group = "hitch";
users.users.hitch = {
group = "hitch";
isSystemUser = true;
};
users.groups.hitch = {};
};
}

@ -117,6 +117,7 @@ in {
group = "traefik";
home = cfg.dataDir;
createHome = true;
isSystemUser = true;
};
users.groups.traefik = {};

@ -116,6 +116,7 @@ in {
users.users = optionalAttrs (cfg.user == "unit") (singleton {
name = "unit";
group = cfg.group;
isSystemUser = true;
});
users.groups = optionalAttrs (cfg.group == "unit") (singleton {

Loading…
Cancel
Save