Merge pull request #183361 from olafklingt/jane2alice

use consistently user alice for examples

Changed files
+26 -26
nixos
doc
manual
configuration
from_md
configuration
maintainers
scripts
modules
installer
tools
services
tests
pkgs
build-support
docker
+2 -2
nixos/doc/manual/configuration/gpu-accel.chapter.md
···
(`/dev/dri/renderD*`) or are tagged as `uaccess` (`/dev/dri/card*`). The
access control lists of devices with the `uaccess` tag will be updated
automatically when a user logs in through `systemd-logind`. For example,
-
if the user *jane* is logged in, the access control list should look as
+
if the user *alice* is logged in, the access control list should look as
follows:
```ShellSession
···
# owner: root
# group: video
user::rw-
-
user:jane:rw-
+
user:alice:rw-
group::rw-
mask::rw-
other::---
+2 -2
nixos/doc/manual/from_md/configuration/gpu-accel.chapter.xml
···
devices with the <literal>uaccess</literal> tag will be updated
automatically when a user logs in through
<literal>systemd-logind</literal>. For example, if the user
-
<emphasis>jane</emphasis> is logged in, the access control list
+
<emphasis>alice</emphasis> is logged in, the access control list
should look as follows:
</para>
<programlisting>
···
# owner: root
# group: video
user::rw-
-
user:jane:rw-
+
user:alice:rw-
group::rw-
mask::rw-
other::---
+1 -1
nixos/maintainers/scripts/lxd/lxd-image-inner.nix
···
# services.xserver.libinput.enable = true;
# Define a user account. Don't forget to set a password with ‘passwd’.
-
# users.users.jane = {
+
# users.users.alice = {
# isNormalUser = true;
# extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user.
# };
+1 -1
nixos/modules/installer/tools/tools.nix
···
# services.xserver.libinput.enable = true;
# Define a user account. Don't forget to set a password with ‘passwd’.
-
# users.users.jane = {
+
# users.users.alice = {
# isNormalUser = true;
# extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user.
# packages = with pkgs; [
+1 -1
nixos/modules/services/games/crossfire-server.nix
···
{
dm_file = '''
admin:secret_password:localhost
-
jane:xyzzy:*
+
alice:xyzzy:*
''';
ban_file = '''
# Bob is a jerk
+1 -1
nixos/modules/services/games/deliantra-server.nix
···
{
dm_file = '''
admin:secret_password:localhost
-
jane:xyzzy:*
+
alice:xyzzy:*
''';
motd = "Welcome to Deliantra!";
settings = '''
+1 -1
nixos/modules/services/networking/smokeping.nix
···
owner = mkOption {
type = types.str;
default = "nobody";
-
example = "Joe Admin";
+
example = "Bob Foobawr";
description = lib.mdDoc "Real name of the owner of the instance";
};
ownerEmail = mkOption {
+2 -2
nixos/tests/docker-tools.nix
···
"docker load --input='${examples.layeredImageWithFakeRootCommands}'"
)
docker.succeed(
-
"docker run --rm ${examples.layeredImageWithFakeRootCommands.imageName} sh -c 'stat -c '%u' /home/jane | grep -E ^1000$'"
+
"docker run --rm ${examples.layeredImageWithFakeRootCommands.imageName} sh -c 'stat -c '%u' /home/alice | grep -E ^1000$'"
)
with subtest("Ensure docker load on merged images loads all of the constituent images"):
···
"docker load --input='${examples.mergedBashFakeRoot}'"
)
docker.succeed(
-
"docker run --rm ${examples.layeredImageWithFakeRootCommands.imageName} sh -c 'stat -c '%u' /home/jane | grep -E ^1000$'"
+
"docker run --rm ${examples.layeredImageWithFakeRootCommands.imageName} sh -c 'stat -c '%u' /home/alice | grep -E ^1000$'"
)
with subtest("The image contains store paths referenced by the fakeRootCommands output"):
+3 -3
nixos/tests/documize.nix
···
" --data 'dbhash={}'"
" --data 'title=NixOS'"
" --data 'message=Docs'"
-
" --data 'firstname=John'"
-
" --data 'lastname=Doe'"
-
" --data 'email=john.doe@nixos.org'"
+
" --data 'firstname=Bob'"
+
" --data 'lastname=Foobar'"
+
" --data 'email=bob.foobar@nixos.org'"
" --data 'password=verysafe'"
" -f localhost:3000/api/setup"
).format(dbhash)
+4 -4
nixos/tests/nginx-auth.nix
···
virtualHosts.lockedroot = {
inherit root;
-
basicAuth.alice = "jane";
+
basicAuth.alice = "pwofa";
};
virtualHosts.lockedsubdir = {
inherit root;
locations."/sublocation/" = {
alias = "${root}/";
-
basicAuth.bob = "john";
+
basicAuth.bob = "pwofb";
};
};
};
···
webserver.fail("curl --fail --resolve lockedroot:80:127.0.0.1 http://lockedroot")
webserver.succeed(
-
"curl --fail --resolve lockedroot:80:127.0.0.1 http://alice:jane@lockedroot"
+
"curl --fail --resolve lockedroot:80:127.0.0.1 http://alice:pwofa@lockedroot"
)
webserver.succeed("curl --fail --resolve lockedsubdir:80:127.0.0.1 http://lockedsubdir")
···
"curl --fail --resolve lockedsubdir:80:127.0.0.1 http://lockedsubdir/sublocation/index.html"
)
webserver.succeed(
-
"curl --fail --resolve lockedsubdir:80:127.0.0.1 http://bob:john@lockedsubdir/sublocation/index.html"
+
"curl --fail --resolve lockedsubdir:80:127.0.0.1 http://bob:pwofb@lockedsubdir/sublocation/index.html"
)
'';
})
+1 -1
nixos/tests/sympa.nix
···
webHost = "localhost";
};
};
-
listMasters = [ "joe@example.org" ];
+
listMasters = [ "bob@example.org" ];
web.enable = true;
web.https = false;
database = {
+3 -3
nixos/tests/systemd-nspawn.nix
···
Key-Length: 1024
Subkey-Type: ELG-E
Subkey-Length: 1024
-
Name-Real: Joe Tester
-
Name-Email: joe@foo.bar
+
Name-Real: Bob Foobar
+
Name-Email: bob@foo.bar
Expire-Date: 0
# Do a commit here, so that we can later print "done"
%commit
···
EOF
gpg --batch --generate-key foo
rm $out/S.gpg-agent $out/S.gpg-agent.*
-
gpg --export joe@foo.bar -a > $out/pubkey.gpg
+
gpg --export bob@foo.bar -a > $out/pubkey.gpg
'');
nspawnImages = (pkgs.runCommand "localhost" { buildInputs = [ pkgs.coreutils pkgs.gnupg ]; } ''
+1 -1
nixos/tests/xmpp/xmpp-sendmessage.nix
···
Please find this *really* important attachment.
Yours truly,
-
John
+
Bob
'';
in writeScriptBin "send-message" ''
#!${(python3.withPackages (ps: [ ps.slixmpp ])).interpreter}
+3 -3
pkgs/build-support/docker/examples.nix
···
pkgs.pkgsStatic.busybox
];
fakeRootCommands = ''
-
mkdir -p ./home/jane
-
chown 1000 ./home/jane
+
mkdir -p ./home/alice
+
chown 1000 ./home/alice
ln -s ${pkgs.hello.overrideAttrs (o: {
# A unique `hello` to make sure that it isn't included via another mechanism by accident.
configureFlags = o.configureFlags or [] ++ [ " --program-prefix=layeredImageWithFakeRootCommands-" ];
···
];
# tarball consisting of bash and layered image with different owner of the
-
# /home/jane directory
+
# /home/alice directory
mergedBashFakeRoot = pkgs.dockerTools.mergeImages [
bash
layeredImageWithFakeRootCommands