nixos/tests: users.(extraUsers|extraGroup->users|group)

+1 -1
nixos/tests/atd.nix
···
machine =
{ config, pkgs, ... }:
{ services.atd.enable = true;
-
users.extraUsers.alice = { isNormalUser = true; };
+
users.users.alice = { isNormalUser = true; };
};
# "at" has a resolution of 1 minute
+2 -2
nixos/tests/common/user-account.nix
···
{ lib, ... }:
-
{ users.extraUsers.alice =
+
{ users.users.alice =
{ isNormalUser = true;
description = "Alice Foobar";
password = "foobar";
};
-
users.extraUsers.bob =
+
users.users.bob =
{ isNormalUser = true;
description = "Bob Foobar";
password = "foobar";
+2 -2
nixos/tests/gitolite.nix
···
# there's nobody around that can input password
PreferredAuthentications publickey
'';
-
users.extraUsers.alice = { isNormalUser = true; };
-
users.extraUsers.bob = { isNormalUser = true; };
+
users.users.alice = { isNormalUser = true; };
+
users.users.bob = { isNormalUser = true; };
};
};
+1 -1
nixos/tests/installer.nix
···
boot.loader.systemd-boot.enable = true;
''}
-
users.extraUsers.alice = {
+
users.users.alice = {
isNormalUser = true;
home = "/home/alice";
description = "Alice Foobar";
+2 -2
nixos/tests/jenkins.nix
···
# should have no effect
services.jenkinsSlave.enable = true;
-
users.extraUsers.jenkins.extraGroups = [ "users" ];
+
users.users.jenkins.extraGroups = [ "users" ];
systemd.services.jenkins.serviceConfig.TimeoutStartSec = "6min";
};
···
{ config, pkgs, ... }:
{ services.jenkinsSlave.enable = true;
-
users.extraUsers.jenkins.extraGroups = [ "users" ];
+
users.users.jenkins.extraGroups = [ "users" ];
};
};
+1 -1
nixos/tests/lightdm.nix
···
enableOCR = true;
testScript = { nodes, ... }: let
-
user = nodes.machine.config.users.extraUsers.alice;
+
user = nodes.machine.config.users.users.alice;
in ''
startAll;
$machine->waitForText(qr/${user.description}/);
+2 -2
nixos/tests/openssh.nix
···
services.openssh.enable = true;
security.pam.services.sshd.limits =
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
-
users.extraUsers.root.openssh.authorizedKeys.keys = [
+
users.users.root.openssh.authorizedKeys.keys = [
snakeOilPublicKey
];
};
···
services.openssh = { enable = true; startWhenNeeded = true; };
security.pam.services.sshd.limits =
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
-
users.extraUsers.root.openssh.authorizedKeys.keys = [
+
users.users.root.openssh.authorizedKeys.keys = [
snakeOilPublicKey
];
};
+1 -1
nixos/tests/pam-oath-login.nix
···
enable = true;
};
-
users.extraUsers.alice = {
+
users.users.alice = {
isNormalUser = true;
name = "alice";
uid = 1000;
+1 -1
nixos/tests/plasma5.nix
···
enableOCR = true;
testScript = { nodes, ... }: let
-
user = nodes.machine.config.users.extraUsers.alice;
+
user = nodes.machine.config.users.users.alice;
xdo = "${pkgs.xdotool}/bin/xdotool";
in ''
startAll;
+1 -1
nixos/tests/sddm.nix
···
enableOCR = true;
testScript = { nodes, ... }: let
-
user = nodes.machine.config.users.extraUsers.alice;
+
user = nodes.machine.config.users.users.alice;
in ''
startAll;
$machine->waitForText(qr/select your user/i);
+1 -1
nixos/tests/slim.nix
···
enableOCR = true;
testScript = { nodes, ... }: let
-
user = nodes.machine.config.users.extraUsers.alice;
+
user = nodes.machine.config.users.users.alice;
in ''
startAll;
$machine->waitForText(qr/Username:/);
+1 -1
nixos/tests/sudo.nix
···
{ config, lib, pkgs, ... }:
with lib;
{
-
users.extraGroups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; };
+
users.groups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; };
users.users = {
test0 = { isNormalUser = true; extraGroups = [ "wheel" ]; };
test1 = { isNormalUser = true; password = password; };
+1 -1
nixos/tests/virtualbox.nix
···
virtualisation.memorySize = 2048;
virtualisation.virtualbox.host.enable = true;
services.xserver.displayManager.auto.user = "alice";
-
users.extraUsers.alice.extraGroups = let
+
users.users.alice.extraGroups = let
inherit (config.virtualisation.virtualbox.host) enableHardening;
in lib.mkIf enableHardening (lib.singleton "vboxusers");
};