Merge pull request #15893 from groxxda/fix/accountsservice

accountsservice: refactor package and service

Changed files
+185 -9
nixos
modules
services
pkgs
+8
nixos/modules/services/desktops/accountsservice.nix
···
services.dbus.packages = [ pkgs.accountsservice ];
systemd.packages = [ pkgs.accountsservice ];
+
+
systemd.services.accounts-daemon= {
+
+
wantedBy = [ "graphical.target" ];
+
+
} // (mkIf (!config.users.mutableUsers) {
+
environment.NIXOS_USERS_PURE = "true";
+
});
};
}
+27
pkgs/development/libraries/accountsservice/Add-nixbld-to-user-blacklist.patch
···
+
From e069102365a9ff03822667f435e662f938e8d768 Mon Sep 17 00:00:00 2001
+
From: Alexander Ried <ried@mytum.de>
+
Date: Wed, 1 Jun 2016 12:49:48 +0200
+
Subject: [PATCH] Add nixbld* to user blacklist
+
+
---
+
src/user-classify.c | 4 ++++
+
1 file changed, 4 insertions(+)
+
+
diff --git a/src/user-classify.c b/src/user-classify.c
+
index 69e6809..0e152b6 100644
+
--- a/src/user-classify.c
+
+++ b/src/user-classify.c
+
@@ -75,6 +75,10 @@ user_classify_is_blacklisted (const char *username)
+
return TRUE;
+
}
+
+
+ if (g_str_has_prefix (username, "nixbld")) {
+
+ return TRUE;
+
+ }
+
+
+
return FALSE;
+
}
+
+
--
+
2.7.4
+
+130
pkgs/development/libraries/accountsservice/Disable-methods-that-change-files-in-etc.patch
···
+
From 6f172007452b39bfda5062fc29ea5382671ac16e Mon Sep 17 00:00:00 2001
+
From: Alexander Ried <ried@mytum.de>
+
Date: Thu, 26 May 2016 19:54:21 +0200
+
Subject: [PATCH] Disable methods that change files in /etc
+
+
Only if environment variable NIXOS_USERS_PURE is set.
+
---
+
src/daemon.c | 10 ++++++++++
+
src/user.c | 35 +++++++++++++++++++++++++++++++++++
+
2 files changed, 45 insertions(+)
+
+
diff --git a/src/daemon.c b/src/daemon.c
+
index e62e124..87459b2 100644
+
--- a/src/daemon.c
+
+++ b/src/daemon.c
+
@@ -931,6 +931,11 @@ daemon_create_user (AccountsAccounts *accounts,
+
const gchar *real_name,
+
gint account_type)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
Daemon *daemon = (Daemon*)accounts;
+
CreateUserData *data;
+
+
@@ -1138,6 +1143,11 @@ daemon_delete_user (AccountsAccounts *accounts,
+
gint64 uid,
+
gboolean remove_files)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
Daemon *daemon = (Daemon*)accounts;
+
DeleteUserData *data;
+
+
diff --git a/src/user.c b/src/user.c
+
index 0fb1a17..dbdebaf 100644
+
--- a/src/user.c
+
+++ b/src/user.c
+
@@ -904,6 +904,11 @@ user_set_real_name (AccountsUser *auser,
+
GDBusMethodInvocation *context,
+
const gchar *real_name)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
User *user = (User*)auser;
+
int uid;
+
const gchar *action_id;
+
@@ -981,6 +986,11 @@ user_set_user_name (AccountsUser *auser,
+
GDBusMethodInvocation *context,
+
const gchar *user_name)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
User *user = (User*)auser;
+
daemon_local_check_auth (user->daemon,
+
user,
+
@@ -1263,6 +1273,11 @@ user_set_home_directory (AccountsUser *auser,
+
GDBusMethodInvocation *context,
+
const gchar *home_dir)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
User *user = (User*)auser;
+
daemon_local_check_auth (user->daemon,
+
user,
+
@@ -1322,6 +1337,11 @@ user_set_shell (AccountsUser *auser,
+
GDBusMethodInvocation *context,
+
const gchar *shell)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
User *user = (User*)auser;
+
daemon_local_check_auth (user->daemon,
+
user,
+
@@ -1602,6 +1622,11 @@ user_set_locked (AccountsUser *auser,
+
GDBusMethodInvocation *context,
+
gboolean locked)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
User *user = (User*)auser;
+
daemon_local_check_auth (user->daemon,
+
user,
+
@@ -1814,6 +1839,11 @@ user_set_password_mode (AccountsUser *auser,
+
GDBusMethodInvocation *context,
+
gint mode)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
User *user = (User*)auser;
+
const gchar *action_id;
+
+
@@ -1905,6 +1935,11 @@ user_set_password (AccountsUser *auser,
+
const gchar *password,
+
const gchar *hint)
+
{
+
+ if (getenv("NIXOS_USERS_PURE")) {
+
+ throw_error (context, ERROR_NOT_SUPPORTED, "Modifying users not supported without users.mutableUsers");
+
+ return;
+
+ }
+
+
+
User *user = (User*)auser;
+
gchar **data;
+
+
--
+
2.9.3
+
+18 -7
pkgs/development/libraries/accountsservice/default.nix
···
-
{ stdenv, fetchurl, pkgconfig, glib, intltool, makeWrapper
+
{ stdenv, fetchurl, pkgconfig, glib, intltool, makeWrapper, shadow
, libtool, gobjectIntrospection, polkit, systemd, coreutils }:
stdenv.mkDerivation rec {
name = "accountsservice-${version}";
-
version = "0.6.40";
-
+
version = "0.6.42";
+
src = fetchurl {
url = "http://www.freedesktop.org/software/accountsservice/accountsservice-${version}.tar.xz";
-
sha256 = "0ayb3y3l25dmwxlh9g071h02mphjfbkvi2k5f635bayb01k7akzh";
+
sha256 = "0zh0kjpdc631qh36plcgpwvnmh9wj8l5cki3aw5r09w6y7198r75";
};
buildInputs = [ pkgconfig glib intltool libtool makeWrapper
···
configureFlags = [ "--with-systemdsystemunitdir=$(out)/etc/systemd/system"
"--localstatedir=/var" ];
+
prePatch = ''
+
substituteInPlace src/daemon.c --replace '"/usr/sbin/useradd"' '"${shadow}/bin/useradd"' \
+
--replace '"/usr/sbin/userdel"' '"${shadow}/bin/userdel"'
+
substituteInPlace src/user.c --replace '"/usr/sbin/usermod"' '"${shadow}/bin/usermod"' \
+
--replace '"/usr/bin/chage"' '"${shadow}/bin/chage"' \
+
--replace '"/usr/bin/passwd"' '"${shadow}/bin/passwd"' \
+
--replace '"/bin/cat"' '"${coreutils}/bin/cat"'
+
'';
-
patches = [ ./no-create-dirs.patch ];
-
patchFlags = "-p0";
-
+
patches = [
+
./no-create-dirs.patch
+
./Add-nixbld-to-user-blacklist.patch
+
./Disable-methods-that-change-files-in-etc.patch
+
];
+
preFixup = ''
wrapProgram "$out/libexec/accounts-daemon" \
--run "${coreutils}/bin/mkdir -p /var/lib/AccountsService/users" \
+2 -2
pkgs/development/libraries/accountsservice/no-create-dirs.patch
···
-
--- src/Makefile.in.orig 2014-04-23 22:30:00.276005326 +0200
-
+++ src/Makefile.in 2014-04-23 22:30:16.809409113 +0200
+
--- a/src/Makefile.in 2014-04-23 22:30:00.276005326 +0200
+
+++ b/src/Makefile.in 2014-04-23 22:30:16.809409113 +0200
@@ -881,8 +881,8 @@
gdbus-codegen --generate-c-code accounts-user-generated --c-namespace Accounts --interface-prefix=org.freedesktop.Accounts. $(top_srcdir)/data/org.freedesktop.Accounts.User.xml