nixos/modules: users.(extraUsers|extraGroup->users|group)

Changed files
+512 -512
nixos
modules
config
hardware
misc
profiles
programs
security
services
admin
amqp
audio
backup
cluster
kubernetes
continuous-integration
databases
editors
games
hardware
logging
mail
misc
monitoring
network-filesystems
networking
printing
scheduling
search
security
system
torrent
web-apps
web-servers
x11
display-managers
system
testing
virtualisation
+2 -2
nixos/modules/config/ldap.nix
···
);
users = mkIf cfg.daemon.enable {
-
extraGroups.nslcd = {
+
groups.nslcd = {
gid = config.ids.gids.nslcd;
};
-
extraUsers.nslcd = {
+
users.nslcd = {
uid = config.ids.uids.nslcd;
description = "nslcd user.";
group = "nslcd";
+2 -2
nixos/modules/config/pulseaudio.nix
···
})
(mkIf systemWide {
-
users.extraUsers.pulse = {
+
users.users.pulse = {
# For some reason, PulseAudio wants UID == GID.
uid = assert uid == gid; uid;
group = "pulse";
···
createHome = true;
};
-
users.extraGroups.pulse.gid = gid;
+
users.groups.pulse.gid = gid;
systemd.services.pulseaudio = {
description = "PulseAudio System-Wide Server";
+1 -1
nixos/modules/hardware/nitrokey.nix
···
{ inherit (cfg) group; }
))
];
-
users.extraGroups."${cfg.group}" = {};
+
users.groups."${cfg.group}" = {};
};
}
+1 -1
nixos/modules/misc/locate.nix
···
};
config = mkIf cfg.enable {
-
users.extraGroups = mkIf isMLocate { mlocate = {}; };
+
users.groups = mkIf isMLocate { mlocate = {}; };
security.wrappers = mkIf isMLocate {
locate = {
+1 -1
nixos/modules/profiles/demo.nix
···
{
imports = [ ./graphical.nix ];
-
users.extraUsers.demo =
+
users.users.demo =
{ isNormalUser = true;
description = "Demo user account";
extraGroups = [ "wheel" ];
+2 -2
nixos/modules/programs/adb.nix
···
description = ''
Whether to configure system to use Android Debug Bridge (adb).
To grant access to a user, it must be part of adbusers group:
-
<code>users.extraUsers.alice.extraGroups = ["adbusers"];</code>
+
<code>users.users.alice.extraGroups = ["adbusers"];</code>
'';
relatedPackages = [ ["androidenv" "platformTools"] ];
};
···
config = mkIf config.programs.adb.enable {
services.udev.packages = [ pkgs.android-udev-rules ];
environment.systemPackages = [ pkgs.androidenv.platformTools ];
-
users.extraGroups.adbusers = {};
+
users.groups.adbusers = {};
};
}
+2 -2
nixos/modules/programs/gphoto2.nix
···
Whether to configure system to use gphoto2.
To grant digital camera access to a user, the user must
be part of the camera group:
-
<code>users.extraUsers.alice.extraGroups = ["camera"];</code>
+
<code>users.users.alice.extraGroups = ["camera"];</code>
'';
};
};
···
config = mkIf config.programs.gphoto2.enable {
services.udev.packages = [ pkgs.libgphoto2 ];
environment.systemPackages = [ pkgs.gphoto2 ];
-
users.extraGroups.camera = {};
+
users.groups.camera = {};
};
}
+1 -1
nixos/modules/programs/sway.nix
···
permissions = "u+rx,g+rx";
};
-
users.extraGroups.sway = {};
+
users.groups.sway = {};
security.pam.services.swaylock = {};
hardware.opengl.enable = mkDefault true;
+1 -1
nixos/modules/programs/wireshark.nix
···
config = mkIf cfg.enable {
environment.systemPackages = [ wireshark ];
-
users.extraGroups.wireshark = {};
+
users.groups.wireshark = {};
security.wrappers.dumpcap = {
source = "${wireshark}/bin/dumpcap";
+1 -1
nixos/modules/security/pam_mount.nix
···
target = "security/pam_mount.conf.xml";
source =
let
-
extraUserVolumes = filterAttrs (n: u: u.cryptHomeLuks != null) config.users.extraUsers;
+
extraUserVolumes = filterAttrs (n: u: u.cryptHomeLuks != null) config.users.users;
userVolumeEntry = user: "<volume user=\"${user.name}\" path=\"${user.cryptHomeLuks}\" mountpoint=\"${user.home}\" />\n";
in
pkgs.writeText "pam_mount.conf.xml" ''
+1 -1
nixos/modules/security/polkit.nix
···
rm -rf /var/lib/{polkit-1,PolicyKit}
'';
-
users.extraUsers.polkituser = {
+
users.users.polkituser = {
description = "PolKit daemon";
uid = config.ids.uids.polkituser;
};
+1 -1
nixos/modules/security/rtkit.nix
···
services.dbus.packages = [ pkgs.rtkit ];
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "rtkit";
uid = config.ids.uids.rtkit;
description = "RealtimeKit daemon";
+2 -2
nixos/modules/services/admin/oxidized.nix
···
};
config = mkIf cfg.enable {
-
users.extraGroups.${cfg.group} = { };
-
users.extraUsers.${cfg.user} = {
+
users.groups.${cfg.group} = { };
+
users.users.${cfg.user} = {
description = "Oxidized service user";
group = cfg.group;
home = cfg.dataDir;
+2 -2
nixos/modules/services/amqp/activemq/default.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.activemq = {
+
users.users.activemq = {
description = "ActiveMQ server user";
group = "activemq";
uid = config.ids.uids.activemq;
};
-
users.extraGroups.activemq.gid = config.ids.gids.activemq;
+
users.groups.activemq.gid = config.ids.gids.activemq;
systemd.services.activemq_init = {
wantedBy = [ "activemq.service" ];
+2 -2
nixos/modules/services/amqp/rabbitmq.nix
···
environment.systemPackages = [ pkgs.rabbitmq_server ];
-
users.extraUsers.rabbitmq = {
+
users.users.rabbitmq = {
description = "RabbitMQ server user";
home = "${cfg.dataDir}";
createHome = true;
···
uid = config.ids.uids.rabbitmq;
};
-
users.extraGroups.rabbitmq.gid = config.ids.gids.rabbitmq;
+
users.groups.rabbitmq.gid = config.ids.gids.rabbitmq;
systemd.services.rabbitmq = {
description = "RabbitMQ Server";
+2 -2
nixos/modules/services/audio/liquidsoap.nix
···
config = mkIf (builtins.length streams != 0) {
-
users.extraUsers.liquidsoap = {
+
users.users.liquidsoap = {
uid = config.ids.uids.liquidsoap;
group = "liquidsoap";
extraGroups = [ "audio" ];
···
createHome = true;
};
-
users.extraGroups.liquidsoap.gid = config.ids.gids.liquidsoap;
+
users.groups.liquidsoap.gid = config.ids.gids.liquidsoap;
systemd.services = builtins.listToAttrs ( map streamService streams );
};
+2 -2
nixos/modules/services/audio/mopidy.nix
···
};
};
-
users.extraUsers.mopidy = {
+
users.users.mopidy = {
inherit uid;
group = "mopidy";
extraGroups = [ "audio" ];
···
home = "${cfg.dataDir}";
};
-
users.extraGroups.mopidy.gid = gid;
+
users.groups.mopidy.gid = gid;
};
+2 -2
nixos/modules/services/audio/mpd.nix
···
};
};
-
users.extraUsers = optionalAttrs (cfg.user == name) (singleton {
+
users.users = optionalAttrs (cfg.user == name) (singleton {
inherit uid;
inherit name;
group = cfg.group;
···
home = "${cfg.dataDir}";
});
-
users.extraGroups = optionalAttrs (cfg.group == name) (singleton {
+
users.groups = optionalAttrs (cfg.group == name) (singleton {
inherit name;
gid = gid;
});
+1 -1
nixos/modules/services/audio/squeezelite.nix
···
};
};
-
users.extraUsers.squeezelite= {
+
users.users.squeezelite= {
inherit uid;
group = "nogroup";
extraGroups = [ "audio" ];
+2 -2
nixos/modules/services/backup/bacula.nix
···
environment.systemPackages = [ pkgs.bacula ];
-
users.extraUsers.bacula = {
+
users.users.bacula = {
group = "bacula";
uid = config.ids.uids.bacula;
home = "${libDir}";
···
shell = "${pkgs.bash}/bin/bash";
};
-
users.extraGroups.bacula.gid = config.ids.gids.bacula;
+
users.groups.bacula.gid = config.ids.gids.bacula;
};
}
+2 -2
nixos/modules/services/backup/duplicati.nix
···
};
};
-
users.extraUsers.duplicati = {
+
users.users.duplicati = {
uid = config.ids.uids.duplicati;
home = "/var/lib/duplicati";
createHome = true;
group = "duplicati";
};
-
users.extraGroups.duplicati.gid = config.ids.gids.duplicati;
+
users.groups.duplicati.gid = config.ids.gids.duplicati;
};
}
+1 -1
nixos/modules/services/backup/mysql-backup.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers = optionalAttrs (cfg.user == defaultUser) (singleton
+
users.users = optionalAttrs (cfg.user == defaultUser) (singleton
{ name = defaultUser;
isSystemUser = true;
createHome = false;
+2 -2
nixos/modules/services/backup/restic-rest-server.nix
···
};
};
-
users.extraUsers.restic = {
+
users.users.restic = {
group = "restic";
home = cfg.dataDir;
createHome = true;
uid = config.ids.uids.restic;
};
-
users.extraGroups.restic.gid = config.ids.uids.restic;
+
users.groups.restic.gid = config.ids.uids.restic;
};
}
+2 -2
nixos/modules/services/cluster/kubernetes/default.nix
···
];
environment.systemPackages = [ cfg.package ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "kubernetes";
uid = config.ids.uids.kubernetes;
description = "Kubernetes user";
···
home = cfg.dataDir;
createHome = true;
};
-
users.extraGroups.kubernetes.gid = config.ids.gids.kubernetes;
+
users.groups.kubernetes.gid = config.ids.gids.kubernetes;
# dns addon is enabled by default
services.kubernetes.addons.dns.enable = mkDefault true;
+2 -2
nixos/modules/services/continuous-integration/buildbot/master.nix
···
};
config = mkIf cfg.enable {
-
users.extraGroups = optional (cfg.group == "buildbot") {
+
users.groups = optional (cfg.group == "buildbot") {
name = "buildbot";
};
-
users.extraUsers = optional (cfg.user == "buildbot") {
+
users.users = optional (cfg.user == "buildbot") {
name = "buildbot";
description = "Buildbot User.";
isNormalUser = true;
+2 -2
nixos/modules/services/continuous-integration/buildbot/worker.nix
···
};
config = mkIf cfg.enable {
-
users.extraGroups = optional (cfg.group == "bbworker") {
+
users.groups = optional (cfg.group == "bbworker") {
name = "bbworker";
};
-
users.extraUsers = optional (cfg.user == "bbworker") {
+
users.users = optional (cfg.user == "bbworker") {
name = "bbworker";
description = "Buildbot Worker User.";
isNormalUser = true;
+1 -1
nixos/modules/services/continuous-integration/buildkite-agent.nix
···
};
config = mkIf config.services.buildkite-agent.enable {
-
users.extraUsers.buildkite-agent =
+
users.users.buildkite-agent =
{ name = "buildkite-agent";
home = cfg.dataDir;
createHome = true;
+2 -2
nixos/modules/services/continuous-integration/gitlab-runner.nix
···
# Make the gitlab-runner command availabe so users can query the runner
environment.systemPackages = [ cfg.package ];
-
users.extraUsers.gitlab-runner = {
+
users.users.gitlab-runner = {
group = "gitlab-runner";
extraGroups = optional hasDocker "docker";
uid = config.ids.uids.gitlab-runner;
···
createHome = true;
};
-
users.extraGroups.gitlab-runner.gid = config.ids.gids.gitlab-runner;
+
users.groups.gitlab-runner.gid = config.ids.gids.gitlab-runner;
};
}
+2 -2
nixos/modules/services/continuous-integration/gocd-agent/default.nix
···
};
config = mkIf cfg.enable {
-
users.extraGroups = optional (cfg.group == "gocd-agent") {
+
users.groups = optional (cfg.group == "gocd-agent") {
name = "gocd-agent";
gid = config.ids.gids.gocd-agent;
};
-
users.extraUsers = optional (cfg.user == "gocd-agent") {
+
users.users = optional (cfg.user == "gocd-agent") {
name = "gocd-agent";
description = "gocd-agent user";
createHome = true;
+4 -4
nixos/modules/services/continuous-integration/gocd-server/default.nix
···
extraOptions = mkOption {
default = [ ];
-
example = [
-
"-X debug"
+
example = [
+
"-X debug"
"-Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=5005"
"-verbose:gc"
"-Xloggc:go-server-gc.log"
···
};
config = mkIf cfg.enable {
-
users.extraGroups = optional (cfg.group == "gocd-server") {
+
users.groups = optional (cfg.group == "gocd-server") {
name = "gocd-server";
gid = config.ids.gids.gocd-server;
};
-
users.extraUsers = optional (cfg.user == "gocd-server") {
+
users.users = optional (cfg.user == "gocd-server") {
name = "gocd-server";
description = "gocd-server user";
createHome = true;
+4 -4
nixos/modules/services/continuous-integration/hydra/default.nix
···
config = mkIf cfg.enable {
-
users.extraGroups.hydra = {
+
users.groups.hydra = {
gid = config.ids.gids.hydra;
};
-
users.extraUsers.hydra =
+
users.users.hydra =
{ description = "Hydra";
group = "hydra";
createHome = true;
···
uid = config.ids.uids.hydra;
};
-
users.extraUsers.hydra-queue-runner =
+
users.users.hydra-queue-runner =
{ description = "Hydra queue runner";
group = "hydra";
useDefaultShell = true;
···
uid = config.ids.uids.hydra-queue-runner;
};
-
users.extraUsers.hydra-www =
+
users.users.hydra-www =
{ description = "Hydra web server";
group = "hydra";
useDefaultShell = true;
+2 -2
nixos/modules/services/continuous-integration/jenkins/default.nix
···
pkgs.dejavu_fonts
];
-
users.extraGroups = optional (cfg.group == "jenkins") {
+
users.groups = optional (cfg.group == "jenkins") {
name = "jenkins";
gid = config.ids.gids.jenkins;
};
-
users.extraUsers = optional (cfg.user == "jenkins") {
+
users.users = optional (cfg.user == "jenkins") {
name = "jenkins";
description = "jenkins user";
createHome = true;
+2 -2
nixos/modules/services/continuous-integration/jenkins/slave.nix
···
};
config = mkIf (cfg.enable && !masterCfg.enable) {
-
users.extraGroups = optional (cfg.group == "jenkins") {
+
users.groups = optional (cfg.group == "jenkins") {
name = "jenkins";
gid = config.ids.gids.jenkins;
};
-
users.extraUsers = optional (cfg.user == "jenkins") {
+
users.users = optional (cfg.user == "jenkins") {
name = "jenkins";
description = "jenkins user";
createHome = true;
+1 -1
nixos/modules/services/databases/4store-endpoint.nix
···
message = "Must specify 4Store database name";
};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = endpointUser;
uid = config.ids.uids.fourstorehttp;
description = "4Store SPARQL endpoint user";
+1 -1
nixos/modules/services/databases/4store.nix
···
message = "Must specify 4Store database name.";
};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = fourStoreUser;
uid = config.ids.uids.fourstore;
description = "4Store database user";
+1 -1
nixos/modules/services/databases/cassandra.nix
···
9160
];
-
users.extraUsers.cassandra =
+
users.users.cassandra =
if config.ids.uids ? "cassandra"
then { uid = config.ids.uids.cassandra; } // cassandraUser
else cassandraUser ;
+2 -2
nixos/modules/services/databases/clickhouse.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.clickhouse = {
+
users.users.clickhouse = {
name = "clickhouse";
uid = config.ids.uids.clickhouse;
group = "clickhouse";
description = "ClickHouse server user";
};
-
users.extraGroups.clickhouse.gid = config.ids.gids.clickhouse;
+
users.groups.clickhouse.gid = config.ids.gids.clickhouse;
systemd.services.clickhouse = {
description = "ClickHouse server";
+2 -2
nixos/modules/services/databases/couchdb.nix
···
};
};
-
users.extraUsers.couchdb = {
+
users.users.couchdb = {
description = "CouchDB Server user";
group = "couchdb";
uid = config.ids.uids.couchdb;
};
-
users.extraGroups.couchdb.gid = config.ids.gids.couchdb;
+
users.groups.couchdb.gid = config.ids.gids.couchdb;
};
}
+2 -2
nixos/modules/services/databases/firebird.nix
···
# there are some additional settings which should be reviewed
'';
-
users.extraUsers.firebird = {
+
users.users.firebird = {
description = "Firebird server user";
group = "firebird";
uid = config.ids.uids.firebird;
};
-
users.extraGroups.firebird.gid = config.ids.gids.firebird;
+
users.groups.firebird.gid = config.ids.gids.firebird;
};
}
+2 -2
nixos/modules/services/databases/foundationdb.nix
···
environment.systemPackages = [ pkg ];
-
users.extraUsers = optionalAttrs (cfg.user == "foundationdb") (singleton
+
users.users = optionalAttrs (cfg.user == "foundationdb") (singleton
{ name = "foundationdb";
description = "FoundationDB User";
uid = config.ids.uids.foundationdb;
group = cfg.group;
});
-
users.extraGroups = optionalAttrs (cfg.group == "foundationdb") (singleton
+
users.groups = optionalAttrs (cfg.group == "foundationdb") (singleton
{ name = "foundationdb";
gid = config.ids.gids.foundationdb;
});
+2 -2
nixos/modules/services/databases/hbase.nix
···
};
};
-
users.extraUsers.hbase = {
+
users.users.hbase = {
description = "HBase Server user";
group = "hbase";
uid = config.ids.uids.hbase;
};
-
users.extraGroups.hbase.gid = config.ids.gids.hbase;
+
users.groups.hbase.gid = config.ids.gids.hbase;
};
}
+2 -2
nixos/modules/services/databases/influxdb.nix
···
'';
};
-
users.extraUsers = optional (cfg.user == "influxdb") {
+
users.users = optional (cfg.user == "influxdb") {
name = "influxdb";
uid = config.ids.uids.influxdb;
description = "Influxdb daemon user";
};
-
users.extraGroups = optional (cfg.group == "influxdb") {
+
users.groups = optional (cfg.group == "influxdb") {
name = "influxdb";
gid = config.ids.gids.influxdb;
};
+1 -1
nixos/modules/services/databases/memcached.nix
···
config = mkIf config.services.memcached.enable {
-
users.extraUsers = optional (cfg.user == "memcached") {
+
users.users = optional (cfg.user == "memcached") {
name = "memcached";
description = "Memcached server user";
};
+1 -1
nixos/modules/services/databases/mongodb.nix
···
config = mkIf config.services.mongodb.enable {
-
users.extraUsers.mongodb = mkIf (cfg.user == "mongodb")
+
users.users.mongodb = mkIf (cfg.user == "mongodb")
{ name = "mongodb";
uid = config.ids.uids.mongodb;
description = "MongoDB server user";
+2 -2
nixos/modules/services/databases/mysql.nix
···
mkDefault (if versionAtLeast config.system.nixos.stateVersion "17.09" then "/var/lib/mysql"
else "/var/mysql");
-
users.extraUsers.mysql = {
+
users.users.mysql = {
description = "MySQL server user";
group = "mysql";
uid = config.ids.uids.mysql;
};
-
users.extraGroups.mysql.gid = config.ids.gids.mysql;
+
users.groups.mysql.gid = config.ids.gids.mysql;
environment.systemPackages = [mysql];
+1 -1
nixos/modules/services/databases/neo4j.nix
···
environment.systemPackages = [ cfg.package ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "neo4j";
uid = config.ids.uids.neo4j;
description = "Neo4j daemon user";
+2 -2
nixos/modules/services/databases/openldap.nix
···
"${configOpts}";
};
-
users.extraUsers.openldap =
+
users.users.openldap =
{ name = cfg.user;
group = cfg.group;
uid = config.ids.uids.openldap;
};
-
users.extraGroups.openldap =
+
users.groups.openldap =
{ name = cfg.group;
gid = config.ids.gids.openldap;
};
+2 -2
nixos/modules/services/databases/opentsdb.nix
···
};
};
-
users.extraUsers.opentsdb = {
+
users.users.opentsdb = {
description = "OpenTSDB Server user";
group = "opentsdb";
uid = config.ids.uids.opentsdb;
};
-
users.extraGroups.opentsdb.gid = config.ids.gids.opentsdb;
+
users.groups.opentsdb.gid = config.ids.gids.opentsdb;
};
}
+2 -2
nixos/modules/services/databases/postgresql.nix
···
host all all ::1/128 md5
'';
-
users.extraUsers.postgres =
+
users.users.postgres =
{ name = "postgres";
uid = config.ids.uids.postgres;
group = "postgres";
description = "PostgreSQL server user";
};
-
users.extraGroups.postgres.gid = config.ids.gids.postgres;
+
users.groups.postgres.gid = config.ids.gids.postgres;
environment.systemPackages = [ postgresql ];
+1 -1
nixos/modules/services/databases/redis.nix
···
allowedTCPPorts = [ cfg.port ];
};
-
users.extraUsers.redis =
+
users.users.redis =
{ name = cfg.user;
description = "Redis database user";
};
+2 -2
nixos/modules/services/databases/rethinkdb.nix
···
'';
};
-
users.extraUsers.rethinkdb = mkIf (cfg.user == "rethinkdb")
+
users.users.rethinkdb = mkIf (cfg.user == "rethinkdb")
{ name = "rethinkdb";
description = "RethinkDB server user";
};
-
users.extraGroups = optionalAttrs (cfg.group == "rethinkdb") (singleton
+
users.groups = optionalAttrs (cfg.group == "rethinkdb") (singleton
{ name = "rethinkdb";
});
+1 -1
nixos/modules/services/databases/riak-cs.nix
···
${cfg.extraAdvancedConfig}
'';
-
users.extraUsers.riak-cs = {
+
users.users.riak-cs = {
name = "riak-cs";
uid = config.ids.uids.riak-cs;
group = "riak";
+2 -2
nixos/modules/services/databases/riak.nix
···
${cfg.extraAdvancedConfig}
'';
-
users.extraUsers.riak = {
+
users.users.riak = {
name = "riak";
uid = config.ids.uids.riak;
group = "riak";
description = "Riak server user";
};
-
users.extraGroups.riak.gid = config.ids.gids.riak;
+
users.groups.riak.gid = config.ids.gids.riak;
systemd.services.riak = {
description = "Riak Server";
+2 -2
nixos/modules/services/databases/stanchion.nix
···
${cfg.extraConfig}
'';
-
users.extraUsers.stanchion = {
+
users.users.stanchion = {
name = "stanchion";
uid = config.ids.uids.stanchion;
group = "stanchion";
description = "Stanchion server user";
};
-
users.extraGroups.stanchion.gid = config.ids.gids.stanchion;
+
users.groups.stanchion.gid = config.ids.gids.stanchion;
systemd.services.stanchion = {
description = "Stanchion Server";
+1 -1
nixos/modules/services/databases/virtuoso.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = virtuosoUser;
uid = config.ids.uids.virtuoso;
description = "virtuoso user";
+2 -2
nixos/modules/services/editors/infinoted.nix
···
};
config = mkIf (cfg.enable) {
-
users.extraUsers = optional (cfg.user == "infinoted")
+
users.users = optional (cfg.user == "infinoted")
{ name = "infinoted";
description = "Infinoted user";
group = cfg.group;
};
-
users.extraGroups = optional (cfg.group == "infinoted")
+
users.groups = optional (cfg.group == "infinoted")
{ name = "infinoted";
};
+1 -1
nixos/modules/services/games/minecraft-server.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.minecraft = {
+
users.users.minecraft = {
description = "Minecraft Server Service user";
home = cfg.dataDir;
createHome = true;
+1 -1
nixos/modules/services/games/minetest-server.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.minetest = {
+
users.users.minetest = {
description = "Minetest Server Service user";
home = "/var/lib/minetest";
createHome = true;
+2 -2
nixos/modules/services/games/terraria.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.terraria = {
+
users.users.terraria = {
description = "Terraria server service user";
home = "/var/lib/terraria";
createHome = true;
uid = config.ids.uids.terraria;
};
-
users.extraGroups.terraria = {
+
users.groups.terraria = {
gid = config.ids.gids.terraria;
members = [ "terraria" ];
};
+2 -2
nixos/modules/services/hardware/sane.nix
···
environment.sessionVariables = env;
services.udev.packages = backends;
-
users.extraGroups."scanner".gid = config.ids.gids.scanner;
+
users.groups."scanner".gid = config.ids.gids.scanner;
})
(mkIf config.services.saned.enable {
···
};
};
-
users.extraUsers."scanner" = {
+
users.users."scanner" = {
uid = config.ids.uids.scanner;
group = "scanner";
};
+2 -2
nixos/modules/services/hardware/tcsd.nix
···
serviceConfig.ExecStart = "${pkgs.trousers}/sbin/tcsd -f -c ${tcsdConf}";
};
-
users.extraUsers = optionalAttrs (cfg.user == "tss") (singleton
+
users.users = optionalAttrs (cfg.user == "tss") (singleton
{ name = "tss";
group = "tss";
uid = config.ids.uids.tss;
});
-
users.extraGroups = optionalAttrs (cfg.group == "tss") (singleton
+
users.groups = optionalAttrs (cfg.group == "tss") (singleton
{ name = "tss";
gid = config.ids.gids.tss;
});
+2 -2
nixos/modules/services/hardware/usbmuxd.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = optional (cfg.user == defaultUserGroup) {
+
users.users = optional (cfg.user == defaultUserGroup) {
name = cfg.user;
description = "usbmuxd user";
group = cfg.group;
};
-
users.extraGroups = optional (cfg.group == defaultUserGroup) {
+
users.groups = optional (cfg.group == defaultUserGroup) {
name = cfg.group;
};
+1 -1
nixos/modules/services/logging/graylog.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = mkIf (cfg.user == "graylog") {
+
users.users = mkIf (cfg.user == "graylog") {
graylog = {
uid = config.ids.uids.graylog;
description = "Graylog server daemon user";
+1 -1
nixos/modules/services/logging/journalwatch.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.${user} = {
+
users.users.${user} = {
isSystemUser = true;
createHome = true;
home = dataDir;
+1 -1
nixos/modules/services/logging/logcheck.nix
···
mapAttrsToList writeIgnoreRule cfg.ignore
++ mapAttrsToList writeIgnoreCronRule cfg.ignoreCron;
-
users.extraUsers = optionalAttrs (cfg.user == "logcheck") (singleton
+
users.users = optionalAttrs (cfg.user == "logcheck") (singleton
{ name = "logcheck";
uid = config.ids.uids.logcheck;
shell = "/bin/sh";
+2 -2
nixos/modules/services/mail/dovecot.nix
···
++ optional cfg.enablePop3 "pop3"
++ optional cfg.enableLmtp "lmtp";
-
users.extraUsers = [
+
users.users = [
{ name = "dovenull";
uid = config.ids.uids.dovenull2;
description = "Dovecot user for untrusted logins";
···
group = cfg.mailGroup;
});
-
users.extraGroups = optional (cfg.group == "dovecot2")
+
users.groups = optional (cfg.group == "dovecot2")
{ name = "dovecot2";
gid = config.ids.gids.dovecot2;
}
+2 -2
nixos/modules/services/mail/dspam.nix
···
config = mkIf cfg.enable (mkMerge [
{
-
users.extraUsers = optionalAttrs (cfg.user == "dspam") (singleton
+
users.users = optionalAttrs (cfg.user == "dspam") (singleton
{ name = "dspam";
group = cfg.group;
uid = config.ids.uids.dspam;
});
-
users.extraGroups = optionalAttrs (cfg.group == "dspam") (singleton
+
users.groups = optionalAttrs (cfg.group == "dspam") (singleton
{ name = "dspam";
gid = config.ids.gids.dspam;
});
+2 -2
nixos/modules/services/mail/exim.nix
···
systemPackages = [ exim ];
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = cfg.user;
description = "Exim mail transfer agent user";
uid = config.ids.uids.exim;
group = cfg.group;
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = cfg.group;
gid = config.ids.gids.exim;
};
+1 -1
nixos/modules/services/mail/mailhog.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.mailhog = {
+
users.users.mailhog = {
name = cfg.user;
description = "MailHog service user";
};
+2 -2
nixos/modules/services/mail/mlmmj.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = cfg.user;
description = "mlmmj user";
home = stateDir;
···
useDefaultShell = true;
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = cfg.group;
gid = config.ids.gids.mlmmj;
};
+2 -2
nixos/modules/services/mail/nullmailer.nix
···
};
users = {
-
extraUsers = singleton {
+
users = singleton {
name = cfg.user;
description = "Nullmailer relay-only mta user";
group = cfg.group;
};
-
extraGroups = singleton {
+
groups = singleton {
name = cfg.group;
};
};
+2 -2
nixos/modules/services/mail/opendkim.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = optionalAttrs (cfg.user == "opendkim") (singleton
+
users.users = optionalAttrs (cfg.user == "opendkim") (singleton
{ name = "opendkim";
group = cfg.group;
uid = config.ids.uids.opendkim;
});
-
users.extraGroups = optionalAttrs (cfg.group == "opendkim") (singleton
+
users.groups = optionalAttrs (cfg.group == "opendkim") (singleton
{ name = "opendkim";
gid = config.ids.gids.opendkim;
});
+2 -2
nixos/modules/services/mail/opensmtpd.nix
···
###### implementation
config = mkIf cfg.enable {
-
users.extraGroups = {
+
users.groups = {
smtpd.gid = config.ids.gids.smtpd;
smtpq.gid = config.ids.gids.smtpq;
};
-
users.extraUsers = {
+
users.users = {
smtpd = {
description = "OpenSMTPD process user";
uid = config.ids.uids.smtpd;
+2 -2
nixos/modules/services/mail/postfix.nix
···
setgid = true;
};
-
users.extraUsers = optional (user == "postfix")
+
users.users = optional (user == "postfix")
{ name = "postfix";
description = "Postfix mail server user";
uid = config.ids.uids.postfix;
group = group;
};
-
users.extraGroups =
+
users.groups =
optional (group == "postfix")
{ name = group;
gid = config.ids.gids.postfix;
+2 -2
nixos/modules/services/mail/postgrey.nix
···
environment.systemPackages = [ pkgs.postgrey ];
users = {
-
extraUsers = {
+
users = {
postgrey = {
description = "Postgrey Daemon";
uid = config.ids.uids.postgrey;
group = "postgrey";
};
};
-
extraGroups = {
+
groups = {
postgrey = {
gid = config.ids.gids.postgrey;
};
+2 -2
nixos/modules/services/mail/postsrsd.nix
···
services.postsrsd.domain = mkDefault config.networking.hostName;
-
users.extraUsers = optionalAttrs (cfg.user == "postsrsd") (singleton
+
users.users = optionalAttrs (cfg.user == "postsrsd") (singleton
{ name = "postsrsd";
group = cfg.group;
uid = config.ids.uids.postsrsd;
});
-
users.extraGroups = optionalAttrs (cfg.group == "postsrsd") (singleton
+
users.groups = optionalAttrs (cfg.group == "postsrsd") (singleton
{ name = "postsrsd";
gid = config.ids.gids.postsrsd;
});
+4 -4
nixos/modules/services/mail/rmilter.nix
···
(mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = cfg.user;
description = "rmilter daemon";
uid = config.ids.uids.rmilter;
group = cfg.group;
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = cfg.group;
gid = config.ids.gids.rmilter;
};
···
})
(mkIf (cfg.enable && cfg.rspamd.enable && rspamdCfg.enable) {
-
users.extraUsers.${cfg.user}.extraGroups = [ rspamdCfg.group ];
+
users.users.${cfg.user}.extraGroups = [ rspamdCfg.group ];
})
(mkIf (cfg.enable && cfg.postfix.enable) {
services.postfix.extraConfig = cfg.postfix.configFragment;
-
users.extraUsers.${postfixCfg.user}.extraGroups = [ cfg.group ];
+
users.users.${postfixCfg.user}.extraGroups = [ cfg.group ];
})
];
}
+2 -2
nixos/modules/services/mail/rspamd.nix
···
# Allow users to run 'rspamc' and 'rspamadm'.
environment.systemPackages = [ pkgs.rspamd ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = cfg.user;
description = "rspamd daemon";
uid = config.ids.uids.rspamd;
group = cfg.group;
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = cfg.group;
gid = config.ids.gids.rspamd;
};
+2 -2
nixos/modules/services/mail/spamassassin.nix
···
systemPackages = [ pkgs.spamassassin ];
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "spamd";
description = "Spam Assassin Daemon";
uid = config.ids.uids.spamd;
group = "spamd";
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = "spamd";
gid = config.ids.gids.spamd;
};
+1 -1
nixos/modules/services/misc/airsonic.nix
···
};
};
-
users.extraUsers.airsonic = {
+
users.users.airsonic = {
description = "Airsonic service user";
name = cfg.user;
home = cfg.home;
+1 -1
nixos/modules/services/misc/apache-kafka.nix
···
environment.systemPackages = [cfg.package];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "apache-kafka";
uid = config.ids.uids.apache-kafka;
description = "Apache Kafka daemon user";
+2 -2
nixos/modules/services/misc/bepasty.nix
···
})
) cfg.servers;
-
users.extraUsers = [{
+
users.users = [{
uid = config.ids.uids.bepasty;
name = user;
group = group;
home = default_home;
}];
-
users.extraGroups = [{
+
users.groups = [{
name = group;
gid = config.ids.gids.bepasty;
}];
+2 -2
nixos/modules/services/misc/calibre-server.nix
···
environment.systemPackages = [ pkgs.calibre ];
-
users.extraUsers.calibre-server = {
+
users.users.calibre-server = {
uid = config.ids.uids.calibre-server;
group = "calibre-server";
};
-
users.extraGroups.calibre-server = {
+
users.groups.calibre-server = {
gid = config.ids.gids.calibre-server;
};
+2 -2
nixos/modules/services/misc/cfdyndns.nix
···
};
};
-
users.extraUsers = {
+
users.users = {
cfdyndns = {
group = "cfdyndns";
uid = config.ids.uids.cfdyndns;
};
};
-
users.extraGroups = {
+
users.groups = {
cfdyndns = {
gid = config.ids.gids.cfdyndns;
};
+1 -1
nixos/modules/services/misc/cgminer.nix
···
config = mkIf config.services.cgminer.enable {
-
users.extraUsers = optionalAttrs (cfg.user == "cgminer") (singleton
+
users.users = optionalAttrs (cfg.user == "cgminer") (singleton
{ name = "cgminer";
uid = config.ids.uids.cgminer;
description = "Cgminer user";
+2 -2
nixos/modules/services/misc/couchpotato.nix
···
};
};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "couchpotato";
group = "couchpotato";
home = "/var/lib/couchpotato/";
···
uid = config.ids.uids.couchpotato;
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "couchpotato";
gid = config.ids.gids.couchpotato;
};
+2 -2
nixos/modules/services/misc/dictd.nix
···
# get the command line client on system path to make some use of the service
environment.systemPackages = [ pkgs.dict ];
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "dictd";
group = "dictd";
description = "DICT.org dictd server";
···
uid = config.ids.uids.dictd;
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "dictd";
gid = config.ids.gids.dictd;
};
+1 -1
nixos/modules/services/misc/disnix.nix
···
++ optional cfg.useWebServiceInterface "${pkgs.dbus_java}/share/java/dbus.jar";
services.tomcat.webapps = optional cfg.useWebServiceInterface pkgs.DisnixWebService;
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "disnix";
gid = config.ids.gids.disnix;
};
+1 -1
nixos/modules/services/misc/docker-registry.nix
···
startAt = optional cfg.enableGarbageCollect cfg.garbageCollectDates;
};
-
users.extraUsers.docker-registry = {
+
users.users.docker-registry = {
createHome = true;
home = cfg.storagePath;
};
+2 -2
nixos/modules/services/misc/emby.nix
···
};
};
-
users.extraUsers = mkIf (cfg.user == "emby") {
+
users.users = mkIf (cfg.user == "emby") {
emby = {
group = cfg.group;
uid = config.ids.uids.emby;
};
};
-
users.extraGroups = mkIf (cfg.group == "emby") {
+
users.groups = mkIf (cfg.group == "emby") {
emby = {
gid = config.ids.gids.emby;
};
+2 -2
nixos/modules/services/misc/errbot.nix
···
};
config = mkIf (cfg.instances != {}) {
-
users.extraUsers.errbot.group = "errbot";
-
users.extraGroups.errbot = {};
+
users.users.errbot.group = "errbot";
+
users.groups.errbot = {};
systemd.services = mapAttrs' (name: instanceCfg: nameValuePair "errbot-${name}" (
let
+1 -1
nixos/modules/services/misc/etcd.nix
···
environment.systemPackages = [ pkgs.etcdctl ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "etcd";
uid = config.ids.uids.etcd;
description = "Etcd daemon user";
+1 -1
nixos/modules/services/misc/exhibitor.nix
···
chmod -R u+w ${cfg.baseDir}/zookeeper/conf
'';
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "zookeeper";
uid = config.ids.uids.zookeeper;
description = "Zookeeper daemon user";
+2 -2
nixos/modules/services/misc/felix.nix
···
###### implementation
config = mkIf cfg.enable {
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "osgi";
gid = config.ids.gids.osgi;
};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "osgi";
uid = config.ids.uids.osgi;
description = "OSGi user";
+1 -1
nixos/modules/services/misc/folding-at-home.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = fahUser;
uid = config.ids.uids.foldingathome;
description = "Folding@Home user";
+1 -1
nixos/modules/services/misc/gammu-smsd.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.${cfg.user} = {
+
users.users.${cfg.user} = {
description = "gammu-smsd user";
uid = config.ids.uids.gammu-smsd;
extraGroups = [ "${cfg.device.group}" ];
+1 -1
nixos/modules/services/misc/geoip-updater.nix
···
}
];
-
users.extraUsers.geoip = {
+
users.users.geoip = {
group = "root";
description = "GeoIP database updater";
uid = config.ids.uids.geoip;
+1 -1
nixos/modules/services/misc/gitea.nix
···
};
users = mkIf (cfg.user == "gitea") {
-
extraUsers.gitea = {
+
users.gitea = {
description = "Gitea Service";
home = cfg.stateDir;
createHome = true;
+5 -5
nixos/modules/services/misc/gitit.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.gitit = {
-
group = config.users.extraGroups.gitit.name;
+
users.users.gitit = {
+
group = config.users.groups.gitit.name;
description = "Gitit user";
home = homeDir;
createHome = true;
uid = config.ids.uids.gitit;
};
-
users.extraGroups.gitit.gid = config.ids.gids.gitit;
+
users.groups.gitit.gid = config.ids.gids.gitit;
systemd.services.gitit = let
uid = toString config.ids.uids.gitit;
···
'';
serviceConfig = {
-
User = config.users.extraUsers.gitit.name;
-
Group = config.users.extraGroups.gitit.name;
+
User = config.users.users.gitit.name;
+
Group = config.users.groups.gitit.name;
ExecStart = with cfg; gititSh haskellPackages extraPackages;
};
};
+2 -2
nixos/modules/services/misc/gitlab.nix
···
# Use postfix to send out mails.
services.postfix.enable = mkDefault true;
-
users.extraUsers = [
+
users.users = [
{ name = cfg.user;
group = cfg.group;
home = "${cfg.statePath}/home";
···
}
];
-
users.extraGroups = [
+
users.groups = [
{ name = cfg.group;
gid = config.ids.gids.gitlab;
}
+2 -2
nixos/modules/services/misc/gitolite.nix
···
push( @{$RC{ENABLE}}, 'git-annex-shell ua');
'';
-
users.extraUsers.${cfg.user} = {
+
users.users.${cfg.user} = {
description = "Gitolite user";
home = cfg.dataDir;
createHome = true;
···
group = cfg.group;
useDefaultShell = true;
};
-
users.extraGroups."${cfg.group}".gid = config.ids.gids.gitolite;
+
users.groups."${cfg.group}".gid = config.ids.gids.gitolite;
systemd.services."gitolite-init" = {
description = "Gitolite initialization";
+2 -2
nixos/modules/services/misc/gogs.nix
···
};
users = mkIf (cfg.user == "gogs") {
-
extraUsers.gogs = {
+
users.gogs = {
description = "Go Git Service";
uid = config.ids.uids.gogs;
group = "gogs";
···
createHome = true;
shell = pkgs.bash;
};
-
extraGroups.gogs.gid = config.ids.gids.gogs;
+
groups.gogs.gid = config.ids.gids.gogs;
};
warnings = optional (cfg.database.password != "")
+2 -2
nixos/modules/services/misc/gollum.nix
···
'';
serviceConfig = {
-
User = config.users.extraUsers.gollum.name;
-
Group = config.users.extraGroups.gollum.name;
+
User = config.users.users.gollum.name;
+
Group = config.users.groups.gollum.name;
PermissionsStartOnly = true;
ExecStart = ''
${pkgs.gollum}/bin/gollum \
+2 -2
nixos/modules/services/misc/gpsd.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "gpsd";
inherit uid;
description = "gpsd daemon user";
home = "/var/empty";
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "gpsd";
inherit gid;
};
+2 -2
nixos/modules/services/misc/home-assistant.nix
···
after = wants;
};
-
users.extraUsers.hass = {
+
users.users.hass = {
home = cfg.configDir;
createHome = true;
group = "hass";
uid = config.ids.uids.hass;
};
-
users.extraGroups.hass.gid = config.ids.gids.hass;
+
users.groups.hass.gid = config.ids.gids.hass;
};
}
+5 -5
nixos/modules/services/misc/ihaskell.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.ihaskell = {
-
group = config.users.extraGroups.ihaskell.name;
+
users.users.ihaskell = {
+
group = config.users.groups.ihaskell.name;
description = "IHaskell user";
home = "/var/lib/ihaskell";
createHome = true;
uid = config.ids.uids.ihaskell;
};
-
users.extraGroups.ihaskell.gid = config.ids.gids.ihaskell;
+
users.groups.ihaskell.gid = config.ids.gids.ihaskell;
systemd.services.ihaskell = {
description = "IHaskell notebook instance";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
-
User = config.users.extraUsers.ihaskell.name;
-
Group = config.users.extraGroups.ihaskell.name;
+
User = config.users.users.ihaskell.name;
+
Group = config.users.groups.ihaskell.name;
ExecStart = "${pkgs.runtimeShell} -c \"cd $HOME;${ihaskell}/bin/ihaskell-notebook\"";
};
};
+2 -2
nixos/modules/services/misc/jackett.nix
···
};
};
-
users.extraUsers.jackett = {
+
users.users.jackett = {
uid = config.ids.uids.jackett;
home = "/var/lib/jackett";
group = "jackett";
};
-
users.extraGroups.jackett.gid = config.ids.gids.jackett;
+
users.groups.jackett.gid = config.ids.gids.jackett;
};
}
+5 -5
nixos/modules/services/misc/mathics.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.mathics = {
-
group = config.users.extraGroups.mathics.name;
+
users.users.mathics = {
+
group = config.users.groups.mathics.name;
description = "Mathics user";
home = "/var/lib/mathics";
createHome = true;
uid = config.ids.uids.mathics;
};
-
users.extraGroups.mathics.gid = config.ids.gids.mathics;
+
users.groups.mathics.gid = config.ids.gids.mathics;
systemd.services.mathics = {
description = "Mathics notebook server";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
-
User = config.users.extraUsers.mathics.name;
-
Group = config.users.extraGroups.mathics.name;
+
User = config.users.users.mathics.name;
+
Group = config.users.groups.mathics.name;
ExecStart = concatStringsSep " " [
"${pkgs.mathics}/bin/mathicsserver"
"--port" (toString cfg.port)
+2 -2
nixos/modules/services/misc/matrix-synapse.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers = [
+
users.users = [
{ name = "matrix-synapse";
group = "matrix-synapse";
home = cfg.dataDir;
···
uid = config.ids.uids.matrix-synapse;
} ];
-
users.extraGroups = [
+
users.groups = [
{ name = "matrix-synapse";
gid = config.ids.gids.matrix-synapse;
} ];
+2 -2
nixos/modules/services/misc/mediatomb.nix
···
serviceConfig.User = "${cfg.user}";
};
-
users.extraGroups = optionalAttrs (cfg.group == "mediatomb") (singleton {
+
users.groups = optionalAttrs (cfg.group == "mediatomb") (singleton {
name = "mediatomb";
gid = gid;
});
-
users.extraUsers = optionalAttrs (cfg.user == "mediatomb") (singleton {
+
users.users = optionalAttrs (cfg.user == "mediatomb") (singleton {
name = "mediatomb";
isSystemUser = true;
group = cfg.group;
+5 -5
nixos/modules/services/misc/nix-daemon.nix
···
description = "
If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build. This prevents impurities
-
in builds by disallowing access to dependencies outside of the Nix
-
store by using network and mount namespaces in a chroot environment.
-
This isn't enabled by default for possible performance impacts due to
-
the initial setup time of a sandbox for each build. It doesn't affect
+
in builds by disallowing access to dependencies outside of the Nix
+
store by using network and mount namespaces in a chroot environment.
+
This isn't enabled by default for possible performance impacts due to
+
the initial setup time of a sandbox for each build. It doesn't affect
derivation hashes, so changing this option will not trigger a rebuild
of packages.
";
···
nix.nrBuildUsers = mkDefault (lib.max 32 cfg.maxJobs);
-
users.extraUsers = nixbldUsers;
+
users.users = nixbldUsers;
services.xserver.displayManager.hiddenUsers = map ({ name, ... }: name) nixbldUsers;
+2 -2
nixos/modules/services/misc/nix-ssh-serve.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.nix-ssh = {
+
users.users.nix-ssh = {
description = "Nix SSH store user";
uid = config.ids.uids.nix-ssh;
useDefaultShell = true;
···
Match All
'';
-
users.extraUsers.nix-ssh.openssh.authorizedKeys.keys = cfg.keys;
+
users.users.nix-ssh.openssh.authorizedKeys.keys = cfg.keys;
};
}
+2 -2
nixos/modules/services/misc/nzbget.nix
···
};
};
-
users.extraUsers = mkIf (cfg.user == "nzbget") {
+
users.users = mkIf (cfg.user == "nzbget") {
nzbget = {
group = cfg.group;
uid = config.ids.uids.nzbget;
};
};
-
users.extraGroups = mkIf (cfg.group == "nzbget") {
+
users.groups = mkIf (cfg.group == "nzbget") {
nzbget = {
gid = config.ids.gids.nzbget;
};
+2 -2
nixos/modules/services/misc/octoprint.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = optionalAttrs (cfg.user == "octoprint") (singleton
+
users.users = optionalAttrs (cfg.user == "octoprint") (singleton
{ name = "octoprint";
group = cfg.group;
uid = config.ids.uids.octoprint;
});
-
users.extraGroups = optionalAttrs (cfg.group == "octoprint") (singleton
+
users.groups = optionalAttrs (cfg.group == "octoprint") (singleton
{ name = "octoprint";
gid = config.ids.gids.octoprint;
});
+1 -1
nixos/modules/services/misc/osrm.nix
···
wantedBy = [ "multi-user.target" ];
serviceConfig = {
-
User = config.users.extraUsers.osrm.name;
+
User = config.users.users.osrm.name;
ExecStart = ''
${pkgs.osrm-backend}/bin/osrm-routed \
--ip ${cfg.address} \
+2 -2
nixos/modules/services/misc/plex.nix
···
allowedUDPPorts = [ 1900 5353 32410 32412 32413 32414 ];
};
-
users.extraUsers = mkIf (cfg.user == "plex") {
+
users.users = mkIf (cfg.user == "plex") {
plex = {
group = cfg.group;
uid = config.ids.uids.plex;
};
};
-
users.extraGroups = mkIf (cfg.group == "plex") {
+
users.groups = mkIf (cfg.group == "plex") {
plex = {
gid = config.ids.gids.plex;
};
+1 -1
nixos/modules/services/misc/plexpy.nix
···
};
};
-
users.extraUsers = mkIf (cfg.user == "plexpy") {
+
users.users = mkIf (cfg.user == "plexpy") {
plexpy = { group = cfg.group; uid = config.ids.uids.plexpy; };
};
};
+2 -2
nixos/modules/services/misc/pykms.nix
···
};
users = {
-
extraUsers.pykms = {
+
users.pykms = {
name = "pykms";
group = "pykms";
home = home;
···
description = "PyKMS daemon user";
};
-
extraGroups.pykms = {
+
groups.pykms = {
gid = config.ids.gids.pykms;
};
};
+2 -2
nixos/modules/services/misc/radarr.nix
···
};
};
-
users.extraUsers.radarr = {
+
users.users.radarr = {
uid = config.ids.uids.radarr;
home = "/var/lib/radarr";
group = "radarr";
};
-
users.extraGroups.radarr.gid = config.ids.gids.radarr;
+
users.groups.radarr.gid = config.ids.gids.radarr;
};
}
+2 -2
nixos/modules/services/misc/redmine.nix
···
}
];
-
users.extraUsers = [
+
users.users = [
{ name = "redmine";
group = "redmine";
uid = config.ids.uids.redmine;
} ];
-
users.extraGroups = [
+
users.groups = [
{ name = "redmine";
gid = config.ids.gids.redmine;
} ];
+1 -1
nixos/modules/services/misc/ripple-data-api.nix
···
];
};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "ripple-data-api";
description = "Ripple data api user";
uid = config.ids.uids.ripple-data-api;
+1 -1
nixos/modules/services/misc/rippled.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "rippled";
description = "Ripple server user";
uid = config.ids.uids.rippled;
+2 -2
nixos/modules/services/misc/serviio.nix
···
};
};
-
users.extraUsers = [
+
users.users = [
{
name = "serviio";
group = "serviio";
···
}
];
-
users.extraGroups = [
+
users.groups = [
{ name = "serviio";}
];
+1 -1
nixos/modules/services/misc/siproxd.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "siproxyd";
uid = config.ids.uids.siproxd;
};
+2 -2
nixos/modules/services/misc/sonarr.nix
···
};
};
-
users.extraUsers.sonarr = {
+
users.users.sonarr = {
uid = config.ids.uids.sonarr;
home = "/var/lib/sonarr";
group = "sonarr";
};
-
users.extraGroups.sonarr.gid = config.ids.gids.sonarr;
+
users.groups.sonarr.gid = config.ids.gids.sonarr;
};
}
+3 -3
nixos/modules/services/misc/subsonic.nix
···
! [ -e "${cfg.home}" ] &&
[ -d "$oldHome" ] &&
[ $(${pkgs.coreutils}/bin/stat -c %u "$oldHome") -eq \
-
${toString config.users.extraUsers.subsonic.uid} ]; then
+
${toString config.users.users.subsonic.uid} ]; then
logger Moving "$oldHome" to "${cfg.home}"
${pkgs.coreutils}/bin/mv -T "$oldHome" "${cfg.home}"
fi
···
};
};
-
users.extraUsers.subsonic = {
+
users.users.subsonic = {
description = "Subsonic daemon user";
home = cfg.home;
createHome = true;
···
uid = config.ids.uids.subsonic;
};
-
users.extraGroups.subsonic.gid = config.ids.gids.subsonic;
+
users.groups.subsonic.gid = config.ids.gids.subsonic;
};
}
+2 -2
nixos/modules/services/misc/uhub.nix
···
config = mkIf cfg.enable {
users = {
-
extraUsers = singleton {
+
users = singleton {
name = "uhub";
uid = config.ids.uids.uhub;
};
-
extraGroups = singleton {
+
groups = singleton {
name = "uhub";
gid = config.ids.gids.uhub;
};
+1 -1
nixos/modules/services/misc/zookeeper.nix
···
'';
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "zookeeper";
uid = config.ids.uids.zookeeper;
description = "Zookeeper daemon user";
+2 -2
nixos/modules/services/monitoring/bosun.nix
···
};
};
-
users.extraUsers.bosun = {
+
users.users.bosun = {
description = "bosun user";
group = "bosun";
uid = config.ids.uids.bosun;
};
-
users.extraGroups.bosun.gid = config.ids.gids.bosun;
+
users.groups.bosun.gid = config.ids.gids.bosun;
};
+1 -1
nixos/modules/services/monitoring/collectd.nix
···
'';
};
-
users.extraUsers = optional (cfg.user == "collectd") {
+
users.users = optional (cfg.user == "collectd") {
name = "collectd";
};
};
+2 -2
nixos/modules/services/monitoring/dd-agent/dd-agent.nix
···
config = mkIf cfg.enable {
environment.systemPackages = [ pkgs."dd-agent" pkgs.sysstat pkgs.procps ];
-
users.extraUsers.datadog = {
+
users.users.datadog = {
description = "Datadog Agent User";
uid = config.ids.uids.datadog;
group = "datadog";
···
createHome = true;
};
-
users.extraGroups.datadog.gid = config.ids.gids.datadog;
+
users.groups.datadog.gid = config.ids.gids.datadog;
systemd.services.dd-agent = {
description = "Datadog agent monitor";
+1 -1
nixos/modules/services/monitoring/fusion-inventory.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "fusion-inventory";
description = "FusionInventory user";
};
+1 -1
nixos/modules/services/monitoring/grafana.nix
···
'';
};
-
users.extraUsers.grafana = {
+
users.users.grafana = {
uid = config.ids.uids.grafana;
description = "Grafana user";
home = cfg.dataDir;
+2 -2
nixos/modules/services/monitoring/graphite.nix
···
cfg.web.enable || cfg.api.enable ||
cfg.seyren.enable || cfg.pager.enable || cfg.beacon.enable
) {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "graphite";
uid = config.ids.uids.graphite;
description = "Graphite daemon user";
home = dataDir;
};
-
users.extraGroups.graphite.gid = config.ids.gids.graphite;
+
users.groups.graphite.gid = config.ids.gids.graphite;
})
];
}
+1 -1
nixos/modules/services/monitoring/heapster.nix
···
};
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "heapster";
uid = config.ids.uids.heapster;
description = "Heapster user";
+2 -2
nixos/modules/services/monitoring/munin.nix
···
environment.systemPackages = [ pkgs.munin ];
-
users.extraUsers = [{
+
users.users = [{
name = "munin";
description = "Munin monitoring user";
group = "munin";
uid = config.ids.uids.munin;
}];
-
users.extraGroups = [{
+
users.groups = [{
name = "munin";
gid = config.ids.gids.munin;
}];
+1 -1
nixos/modules/services/monitoring/nagios.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.nagios = {
+
users.users.nagios = {
description = "Nagios user ";
uid = config.ids.uids.nagios;
home = nagiosState;
+2 -2
nixos/modules/services/monitoring/netdata.nix
···
};
-
users.extraUsers = optional (cfg.user == defaultUser) {
+
users.users = optional (cfg.user == defaultUser) {
name = defaultUser;
};
-
users.extraGroups = optional (cfg.group == defaultUser) {
+
users.groups = optional (cfg.group == defaultUser) {
name = defaultUser;
};
+2 -2
nixos/modules/services/monitoring/prometheus/default.nix
···
};
config = mkIf cfg.enable {
-
users.extraGroups.${promGroup}.gid = config.ids.gids.prometheus;
-
users.extraUsers.${promUser} = {
+
users.groups.${promGroup}.gid = config.ids.gids.prometheus;
+
users.users.${promUser} = {
description = "Prometheus daemon user";
uid = config.ids.uids.prometheus;
group = promGroup;
+2 -2
nixos/modules/services/monitoring/riemann-dash.nix
···
config = mkIf cfg.enable {
-
users.extraGroups.riemanndash.gid = config.ids.gids.riemanndash;
+
users.groups.riemanndash.gid = config.ids.gids.riemanndash;
-
users.extraUsers.riemanndash = {
+
users.users.riemanndash = {
description = "riemann-dash daemon user";
uid = config.ids.uids.riemanndash;
group = "riemanndash";
+2 -2
nixos/modules/services/monitoring/riemann-tools.nix
···
config = mkIf cfg.enableHealth {
-
users.extraGroups.riemanntools.gid = config.ids.gids.riemanntools;
+
users.groups.riemanntools.gid = config.ids.gids.riemanntools;
-
users.extraUsers.riemanntools = {
+
users.users.riemanntools = {
description = "riemann-tools daemon user";
uid = config.ids.uids.riemanntools;
group = "riemanntools";
+2 -2
nixos/modules/services/monitoring/riemann.nix
···
config = mkIf cfg.enable {
-
users.extraGroups.riemann.gid = config.ids.gids.riemann;
+
users.groups.riemann.gid = config.ids.gids.riemann;
-
users.extraUsers.riemann = {
+
users.users.riemann = {
description = "riemann daemon user";
uid = config.ids.uids.riemann;
group = "riemann";
+2 -2
nixos/modules/services/monitoring/scollector.nix
···
};
};
-
users.extraUsers.scollector = {
+
users.users.scollector = {
description = "scollector user";
group = "scollector";
uid = config.ids.uids.scollector;
};
-
users.extraGroups.scollector.gid = config.ids.gids.scollector;
+
users.groups.scollector.gid = config.ids.gids.scollector;
};
+1 -1
nixos/modules/services/monitoring/statsd.nix
···
message = "Only builtin backends (graphite, console, repeater) or backends enumerated in `pkgs.nodePackages` are allowed!";
}) cfg.backends;
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "statsd";
uid = config.ids.uids.statsd;
description = "Statsd daemon user";
+1 -1
nixos/modules/services/monitoring/telegraf.nix
···
};
};
-
users.extraUsers = [{
+
users.users = [{
name = "telegraf";
uid = config.ids.uids.telegraf;
description = "telegraf daemon user";
+2 -2
nixos/modules/services/monitoring/ups.nix
···
/*
-
users.extraUsers = [
+
users.users = [
{ name = "nut";
uid = 84;
home = "/var/lib/nut";
···
}
];
-
users.extraGroups = [
+
users.groups = [
{ name = "nut";
gid = 84;
}
+1 -1
nixos/modules/services/monitoring/vnstat.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.vnstatd = {
+
users.users.vnstatd = {
isSystemUser = true;
description = "vnstat daemon user";
home = "/var/lib/vnstat";
+1 -1
nixos/modules/services/monitoring/zabbix-agent.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = mkIf (!config.services.zabbixServer.enable) (singleton
+
users.users = mkIf (!config.services.zabbixServer.enable) (singleton
{ name = "zabbix";
uid = config.ids.uids.zabbix;
description = "Zabbix daemon user";
+1 -1
nixos/modules/services/monitoring/zabbix-server.nix
···
services.postgresql.enable = useLocalPostgres;
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "zabbix";
uid = config.ids.uids.zabbix;
description = "Zabbix daemon user";
+2 -2
nixos/modules/services/network-filesystems/ceph.nix
···
in
generators.toINI {} totalConfig;
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "ceph";
uid = config.ids.uids.ceph;
description = "Ceph daemon user";
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = "ceph";
gid = config.ids.gids.ceph;
};
+2 -2
nixos/modules/services/network-filesystems/davfs2.nix
···
environment.systemPackages = [ pkgs.davfs2 ];
environment.etc."davfs2/davfs2.conf".source = cfgFile;
-
users.extraGroups = optionalAttrs (cfg.davGroup == "davfs2") (singleton {
+
users.groups = optionalAttrs (cfg.davGroup == "davfs2") (singleton {
name = "davfs2";
gid = config.ids.gids.davfs2;
});
-
users.extraUsers = optionalAttrs (cfg.davUser == "davfs2") (singleton {
+
users.users = optionalAttrs (cfg.davUser == "davfs2") (singleton {
name = "davfs2";
createHome = false;
group = cfg.davGroup;
+2 -2
nixos/modules/services/network-filesystems/ipfs.nix
···
user_allow_other
''; };
-
users.extraUsers = mkIf (cfg.user == "ipfs") {
+
users.users = mkIf (cfg.user == "ipfs") {
ipfs = {
group = cfg.group;
home = cfg.dataDir;
···
};
};
-
users.extraGroups = mkIf (cfg.group == "ipfs") {
+
users.groups = mkIf (cfg.group == "ipfs") {
ipfs.gid = config.ids.gids.ipfs;
};
+2 -2
nixos/modules/services/network-filesystems/tahoe.nix
···
cp /etc/tahoe-lafs/introducer-"${node}".cfg ${lib.escapeShellArg nodedir}/tahoe.cfg
'';
});
-
users.extraUsers = flip mapAttrs' cfg.introducers (node: _:
+
users.users = flip mapAttrs' cfg.introducers (node: _:
nameValuePair "tahoe.introducer-${node}" {
description = "Tahoe node user for introducer ${node}";
isSystemUser = true;
···
cp /etc/tahoe-lafs/${lib.escapeShellArg node}.cfg ${lib.escapeShellArg nodedir}/tahoe.cfg
'';
});
-
users.extraUsers = flip mapAttrs' cfg.nodes (node: _:
+
users.users = flip mapAttrs' cfg.nodes (node: _:
nameValuePair "tahoe.${node}" {
description = "Tahoe node user for node ${node}";
isSystemUser = true;
+2 -2
nixos/modules/services/network-filesystems/xtreemfs.nix
···
environment.systemPackages = [ xtreemfs ];
-
users.extraUsers.xtreemfs =
+
users.users.xtreemfs =
{ uid = config.ids.uids.xtreemfs;
description = "XtreemFS user";
createHome = true;
home = home;
};
-
users.extraGroups.xtreemfs =
+
users.groups.xtreemfs =
{ gid = config.ids.gids.xtreemfs;
};
+1 -1
nixos/modules/services/network-filesystems/yandex-disk.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = mkIf (cfg.user == null) [ {
+
users.users = mkIf (cfg.user == null) [ {
name = u;
uid = config.ids.uids.yandexdisk;
group = "nogroup";
+2 -2
nixos/modules/services/networking/amuled.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = mkIf (cfg.user == null) [
+
users.users = mkIf (cfg.user == null) [
{ name = "amule";
description = "AMule daemon";
group = "amule";
uid = config.ids.uids.amule;
} ];
-
users.extraGroups = mkIf (cfg.user == null) [
+
users.groups = mkIf (cfg.user == null) [
{ name = "amule";
gid = config.ids.gids.amule;
} ];
+2 -2
nixos/modules/services/networking/aria2.nix
···
allowedTCPPorts = [ config.services.aria2.rpcListenPort ];
};
-
users.extraUsers.aria2 = {
+
users.users.aria2 = {
group = "aria2";
uid = config.ids.uids.aria2;
description = "aria2 user";
···
createHome = false;
};
-
users.extraGroups.aria2.gid = config.ids.gids.aria2;
+
users.groups.aria2.gid = config.ids.gids.aria2;
systemd.services.aria2 = {
description = "aria2 Service";
+2 -2
nixos/modules/services/networking/asterisk.nix
···
environment.etc.asterisk.source = asteriskEtc;
-
users.extraUsers.asterisk =
+
users.users.asterisk =
{ name = asteriskUser;
group = asteriskGroup;
uid = config.ids.uids.asterisk;
···
home = varlibdir;
};
-
users.extraGroups.asterisk =
+
users.groups.asterisk =
{ name = asteriskGroup;
gid = config.ids.gids.asterisk;
};
+2 -2
nixos/modules/services/networking/avahi-daemon.nix
···
services.avahi.hostName = mkDefault config.networking.hostName;
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "avahi";
uid = config.ids.uids.avahi;
description = "`avahi-daemon' privilege separation user";
home = "/var/empty";
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "avahi";
gid = config.ids.gids.avahi;
};
+1 -1
nixos/modules/services/networking/bind.nix
···
config = mkIf config.services.bind.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = bindUser;
uid = config.ids.uids.bind;
description = "BIND daemon user";
+2 -2
nixos/modules/services/networking/bird.nix
···
};
};
users = {
-
extraUsers.${variant} = {
+
users.${variant} = {
description = "BIRD Internet Routing Daemon user";
group = variant;
};
-
extraGroups.${variant} = {};
+
groups.${variant} = {};
};
};
};
+2 -2
nixos/modules/services/networking/bitlbee.nix
···
config = mkIf config.services.bitlbee.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "bitlbee";
uid = bitlbeeUid;
description = "BitlBee user";
···
createHome = true;
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "bitlbee";
gid = config.ids.gids.bitlbee;
};
+2 -2
nixos/modules/services/networking/btsync.nix
···
services.btsync.package = mkOptionDefault pkgs.bittorrentSync14;
-
users.extraUsers.btsync = {
+
users.users.btsync = {
description = "Bittorrent Sync Service user";
home = cfg.storagePath;
createHome = true;
···
group = "btsync";
};
-
users.extraGroups = [
+
users.groups = [
{ name = "btsync";
}];
+2 -2
nixos/modules/services/networking/charybdis.nix
···
config = mkIf cfg.enable (lib.mkMerge [
{
-
users.extraUsers = singleton {
+
users.users = singleton {
name = cfg.user;
description = "Charybdis IRC daemon user";
uid = config.ids.uids.ircd;
group = cfg.group;
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = cfg.group;
gid = config.ids.gids.ircd;
};
+2 -2
nixos/modules/services/networking/chrony.nix
···
# Make chronyc available in the system path
environment.systemPackages = [ pkgs.chrony ];
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "chrony";
gid = config.ids.gids.chrony;
};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "chrony";
uid = config.ids.uids.chrony;
group = "chrony";
+1 -1
nixos/modules/services/networking/cntlm.nix
···
};
};
-
users.extraUsers.cntlm = {
+
users.users.cntlm = {
name = "cntlm";
description = "cntlm system-wide daemon";
isSystemUser = true;
+1 -1
nixos/modules/services/networking/consul.nix
···
config = mkIf cfg.enable (
mkMerge [{
-
users.extraUsers."consul" = {
+
users.users."consul" = {
description = "Consul agent daemon user";
uid = config.ids.uids.consul;
# The shell is needed for health checks
+2 -2
nixos/modules/services/networking/coturn.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers = [
+
users.users = [
{ name = "turnserver";
uid = config.ids.uids.turnserver;
description = "coturn TURN server user";
} ];
-
users.extraGroups = [
+
users.groups = [
{ name = "turnserver";
gid = config.ids.gids.turnserver;
members = [ "turnserver" ];
+1 -1
nixos/modules/services/networking/dhcpd.nix
···
config = mkIf (cfg4.enable || cfg6.enable) {
users = {
-
extraUsers.dhcpd = {
+
users.dhcpd = {
uid = config.ids.uids.dhcpd;
description = "DHCP daemon user";
};
+1 -1
nixos/modules/services/networking/dnscache.nix
···
config = mkIf config.services.dnscache.enable {
environment.systemPackages = [ pkgs.djbdns ];
-
users.extraUsers.dnscache = {};
+
users.users.dnscache = {};
systemd.services.dnscache = {
description = "djbdns dnscache server";
+1 -1
nixos/modules/services/networking/dnschain.nix
···
dns = "127.0.0.1:${toString cfg.dns.port}";
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = username;
description = "DNSChain daemon user";
home = dataDir;
+1 -1
nixos/modules/services/networking/dnsmasq.nix
···
services.dbus.packages = [ dnsmasq ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "dnsmasq";
uid = config.ids.uids.dnsmasq;
description = "Dnsmasq daemon user";
+2 -2
nixos/modules/services/networking/ejabberd.nix
···
config = mkIf cfg.enable {
environment.systemPackages = [ cfg.package ];
-
users.extraUsers = optionalAttrs (cfg.user == "ejabberd") (singleton
+
users.users = optionalAttrs (cfg.user == "ejabberd") (singleton
{ name = "ejabberd";
group = cfg.group;
home = cfg.spoolDir;
···
uid = config.ids.uids.ejabberd;
});
-
users.extraGroups = optionalAttrs (cfg.group == "ejabberd") (singleton
+
users.groups = optionalAttrs (cfg.group == "ejabberd") (singleton
{ name = "ejabberd";
gid = config.ids.gids.ejabberd;
});
+2 -2
nixos/modules/services/networking/freenet.nix
···
serviceConfig.Nice = cfg.nice;
};
-
users.extraUsers.freenet = {
+
users.users.freenet = {
group = "freenet";
description = "Freenet daemon user";
home = varDir;
···
uid = config.ids.uids.freenet;
};
-
users.extraGroups.freenet.gid = config.ids.gids.freenet;
+
users.groups.freenet.gid = config.ids.gids.freenet;
};
}
+1 -1
nixos/modules/services/networking/freeradius.nix
···
config = mkIf (cfg.enable) {
users = {
-
extraUsers.radius = {
+
users.radius = {
/*uid = config.ids.uids.radius;*/
description = "Radius daemon user";
};
+2 -2
nixos/modules/services/networking/gale.nix
···
systemPackages = [ pkgs.gale ];
};
-
users.extraUsers = [{
+
users.users = [{
name = cfg.user;
description = "Gale daemon";
uid = config.ids.uids.gale;
···
createHome = true;
}];
-
users.extraGroups = [{
+
users.groups = [{
name = cfg.group;
gid = config.ids.gids.gale;
}];
+2 -2
nixos/modules/services/networking/gateone.nix
···
environment.systemPackages = with pkgs.pythonPackages; [
gateone pkgs.openssh pkgs.procps pkgs.coreutils pkgs.cacert];
-
users.extraUsers.gateone = {
+
users.users.gateone = {
description = "GateOne privilege separation user";
uid = config.ids.uids.gateone;
home = cfg.settingsDir;
};
-
users.extraGroups.gateone.gid = config.ids.gids.gateone;
+
users.groups.gateone.gid = config.ids.gids.gateone;
systemd.services.gateone = with pkgs; {
description = "GateOne web-based terminal";
+2 -2
nixos/modules/services/networking/git-daemon.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = if cfg.user != "git" then {} else singleton
+
users.users = if cfg.user != "git" then {} else singleton
{ name = "git";
uid = config.ids.uids.git;
description = "Git daemon user";
};
-
users.extraGroups = if cfg.group != "git" then {} else singleton
+
users.groups = if cfg.group != "git" then {} else singleton
{ name = "git";
gid = config.ids.gids.git;
};
+2 -2
nixos/modules/services/networking/gnunet.nix
···
config = mkIf config.services.gnunet.enable {
-
users.extraUsers.gnunet = {
+
users.users.gnunet = {
group = "gnunet";
description = "GNUnet User";
home = homeDir;
···
uid = config.ids.uids.gnunet;
};
-
users.extraGroups.gnunet.gid = config.ids.gids.gnunet;
+
users.groups.gnunet.gid = config.ids.gids.gnunet;
# The user tools that talk to `gnunetd' should come from the same source,
# so install them globally.
+1 -1
nixos/modules/services/networking/hans.nix
···
};
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = hansUser;
description = "Hans daemon user";
};
+2 -2
nixos/modules/services/networking/haproxy.nix
···
environment.systemPackages = [ pkgs.haproxy ];
-
users.extraUsers.haproxy = {
+
users.users.haproxy = {
group = "haproxy";
uid = config.ids.uids.haproxy;
};
-
users.extraGroups.haproxy.gid = config.ids.uids.haproxy;
+
users.groups.haproxy.gid = config.ids.uids.haproxy;
};
}
+2 -2
nixos/modules/services/networking/i2p.nix
···
###### implementation
config = mkIf cfg.enable {
-
users.extraUsers.i2p = {
+
users.users.i2p = {
group = "i2p";
description = "i2p User";
home = homeDir;
createHome = true;
uid = config.ids.uids.i2p;
};
-
users.extraGroups.i2p.gid = config.ids.gids.i2p;
+
users.groups.i2p.gid = config.ids.gids.i2p;
systemd.services.i2p = {
description = "I2P router with administration interface for hidden services";
after = [ "network.target" ];
+2 -2
nixos/modules/services/networking/i2pd.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.i2pd = {
+
users.users.i2pd = {
group = "i2pd";
description = "I2Pd User";
home = homeDir;
···
uid = config.ids.uids.i2pd;
};
-
users.extraGroups.i2pd.gid = config.ids.gids.i2pd;
+
users.groups.i2pd.gid = config.ids.gids.i2pd;
systemd.services.i2pd = {
description = "Minimal I2P router";
+2 -2
nixos/modules/services/networking/iodine.nix
···
};
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = iodinedUser;
uid = config.ids.uids.iodined;
description = "Iodine daemon user";
};
-
users.extraGroups.iodined.gid = config.ids.gids.iodined;
+
users.groups.iodined.gid = config.ids.gids.iodined;
};
}
+2 -2
nixos/modules/services/networking/ircd-hybrid/default.nix
···
config = mkIf config.services.ircdHybrid.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "ircd";
description = "IRCD owner";
group = "ircd";
uid = config.ids.uids.ircd;
};
-
users.extraGroups.ircd.gid = config.ids.gids.ircd;
+
users.groups.ircd.gid = config.ids.gids.ircd;
systemd.services."ircd-hybrid" = {
description = "IRCD Hybrid server";
+2 -2
nixos/modules/services/networking/kippo.nix
···
${cfg.extraConfig}
'';
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "kippo";
description = "kippo web server privilege separation user";
uid = 108; # why does config.ids.uids.kippo give an error?
};
-
users.extraGroups = singleton { name = "kippo";gid=108; };
+
users.groups = singleton { name = "kippo";gid=108; };
systemd.services.kippo = with pkgs; {
description = "Kippo Web Server";
+2 -2
nixos/modules/services/networking/kresd.nix
···
config = mkIf cfg.enable {
environment.etc."kresd.conf".source = configFile; # not required
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "kresd";
uid = config.ids.uids.kresd;
group = "kresd";
description = "Knot-resolver daemon user";
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "kresd";
gid = config.ids.gids.kresd;
};
+2 -2
nixos/modules/services/networking/lambdabot.nix
···
};
};
-
users.extraUsers.lambdabot = {
+
users.users.lambdabot = {
group = "lambdabot";
description = "Lambdabot daemon user";
home = "/var/lib/lambdabot";
···
uid = config.ids.uids.lambdabot;
};
-
users.extraGroups.lambdabot.gid = config.ids.gids.lambdabot;
+
users.groups.lambdabot.gid = config.ids.gids.lambdabot;
};
+2 -2
nixos/modules/services/networking/lldpd.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers._lldpd = {
+
users.users._lldpd = {
description = "lldpd user";
group = "_lldpd";
home = "/var/run/lldpd";
isSystemUser = true;
};
-
users.extraGroups._lldpd = {};
+
users.groups._lldpd = {};
environment.systemPackages = [ pkgs.lldpd ];
systemd.packages = [ pkgs.lldpd ];
+2 -2
nixos/modules/services/networking/mailpile.nix
···
config = mkIf config.services.mailpile.enable {
-
users.extraUsers.mailpile =
+
users.users.mailpile =
{ uid = config.ids.uids.mailpile;
description = "Mailpile user";
createHome = true;
home = "/var/lib/mailpile";
};
-
users.extraGroups.mailpile =
+
users.groups.mailpile =
{ gid = config.ids.gids.mailpile;
};
+2 -2
nixos/modules/services/networking/matterbridge.nix
···
warnings = optional options.services.matterbridge.configFile.isDefined
"The option services.matterbridge.configFile is insecure and should be replaced with services.matterbridge.configPath";
-
users.extraUsers = optional (cfg.user == "matterbridge")
+
users.users = optional (cfg.user == "matterbridge")
{ name = "matterbridge";
group = "matterbridge";
};
-
users.extraGroups = optional (cfg.group == "matterbridge")
+
users.groups = optional (cfg.group == "matterbridge")
{ name = "matterbridge";
};
+2 -2
nixos/modules/services/networking/minidlna.nix
···
'') cfg.mediaDirs}
'';
-
users.extraUsers.minidlna = {
+
users.users.minidlna = {
description = "MiniDLNA daemon user";
group = "minidlna";
uid = config.ids.uids.minidlna;
};
-
users.extraGroups.minidlna.gid = config.ids.gids.minidlna;
+
users.groups.minidlna.gid = config.ids.gids.minidlna;
systemd.services.minidlna =
{ description = "MiniDLNA Server";
+1 -1
nixos/modules/services/networking/mjpg-streamer.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = optional (cfg.user == "mjpg-streamer") {
+
users.users = optional (cfg.user == "mjpg-streamer") {
name = "mjpg-streamer";
uid = config.ids.uids.mjpg-streamer;
group = cfg.group;
+2 -2
nixos/modules/services/networking/monero.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "monero";
uid = config.ids.uids.monero;
description = "Monero daemon user";
···
createHome = true;
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = "monero";
gid = config.ids.gids.monero;
};
+1 -1
nixos/modules/services/networking/morty.nix
···
config = mkIf config.services.morty.enable {
-
users.extraUsers.morty =
+
users.users.morty =
{ description = "Morty user";
createHome = true;
home = "/var/lib/morty";
+2 -2
nixos/modules/services/networking/mosquitto.nix
···
) cfg.users);
};
-
users.extraUsers.mosquitto = {
+
users.users.mosquitto = {
description = "Mosquitto MQTT Broker Daemon owner";
group = "mosquitto";
uid = config.ids.uids.mosquitto;
···
createHome = true;
};
-
users.extraGroups.mosquitto.gid = config.ids.gids.mosquitto;
+
users.groups.mosquitto.gid = config.ids.gids.mosquitto;
};
}
+1 -1
nixos/modules/services/networking/murmur.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.murmur = {
+
users.users.murmur = {
description = "Murmur Service user";
home = "/var/lib/murmur";
createHome = true;
+2 -2
nixos/modules/services/networking/namecoind.nix
···
config = ${configFile}
'';
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "namecoin";
uid = config.ids.uids.namecoin;
description = "Namecoin daemon user";
···
createHome = true;
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = "namecoin";
gid = config.ids.gids.namecoin;
};
+2 -2
nixos/modules/services/networking/networkmanager.nix
···
environment.systemPackages = cfg.packages;
-
users.extraGroups = [{
+
users.groups = [{
name = "networkmanager";
gid = config.ids.gids.networkmanager;
}
···
name = "nm-openvpn";
gid = config.ids.gids.nm-openvpn;
}];
-
users.extraUsers = [{
+
users.users = [{
name = "nm-openvpn";
uid = config.ids.uids.nm-openvpn;
extraGroups = [ "networkmanager" ];
+1 -1
nixos/modules/services/networking/ngircd.nix
···
serviceConfig.User = "ngircd";
};
-
users.extraUsers.ngircd = {
+
users.users.ngircd = {
uid = config.ids.uids.ngircd;
description = "ngircd user.";
};
+1 -1
nixos/modules/services/networking/nix-serve.nix
···
};
};
-
users.extraUsers.nix-serve = {
+
users.users.nix-serve = {
description = "Nix-serve user";
uid = config.ids.uids.nix-serve;
};
+1 -1
nixos/modules/services/networking/nntp-proxy.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = proxyUser;
uid = config.ids.uids.nntp-proxy;
description = "NNTP-Proxy daemon user";
+2 -2
nixos/modules/services/networking/nsd.nix
···
environment.systemPackages = [ nsdPkg ];
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = username;
gid = config.ids.gids.nsd;
};
-
users.extraUsers = singleton {
+
users.users = singleton {
name = username;
description = "NSD service user";
home = stateDir;
+1 -1
nixos/modules/services/networking/ntpd.nix
···
environment.systemPackages = [ pkgs.ntp ];
services.timesyncd.enable = mkForce false;
-
users.extraUsers = singleton
+
users.users = singleton
{ name = ntpUser;
uid = config.ids.uids.ntp;
description = "NTP daemon user";
+2 -2
nixos/modules/services/networking/nylon.nix
···
config = mkIf (length(enabledNylons) > 0) {
-
users.extraUsers.nylon = {
+
users.users.nylon = {
group = "nylon";
description = "Nylon SOCKS Proxy";
home = homeDir;
···
uid = config.ids.uids.nylon;
};
-
users.extraGroups.nylon.gid = config.ids.gids.nylon;
+
users.groups.nylon.gid = config.ids.gids.nylon;
systemd.services = fold (a: b: a // b) {} nylonUnits;
+2 -2
nixos/modules/services/networking/oidentd.nix
···
optionalString config.networking.enableIPv6 " -a ::";
};
-
users.extraUsers.oidentd = {
+
users.users.oidentd = {
description = "Ident Protocol daemon user";
group = "oidentd";
uid = config.ids.uids.oidentd;
};
-
users.extraGroups.oidentd.gid = config.ids.gids.oidentd;
+
users.groups.oidentd.gid = config.ids.gids.oidentd;
};
+1 -1
nixos/modules/services/networking/openntpd.nix
···
environment.etc."ntpd.conf".text = configFile;
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "ntp";
uid = config.ids.uids.ntp;
description = "OpenNTP daemon user";
+2 -2
nixos/modules/services/networking/owamp.nix
···
###### implementation
config = mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "owamp";
group = "owamp";
description = "Owamp daemon";
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = "owamp";
};
+1 -1
nixos/modules/services/networking/pdns-recursor.nix
···
config = mkIf cfg.enable {
-
users.extraUsers."${username}" = {
+
users.users."${username}" = {
home = dataDir;
createHome = true;
uid = config.ids.uids.pdns-recursor;
+2 -2
nixos/modules/services/networking/pdnsd.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = pdnsdUser;
uid = config.ids.uids.pdnsd;
group = pdnsdGroup;
description = "pdnsd user";
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = pdnsdGroup;
gid = config.ids.gids.pdnsd;
};
+2 -2
nixos/modules/services/networking/polipo.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "polipo";
uid = config.ids.uids.polipo;
description = "Polipo caching proxy user";
···
createHome = true;
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "polipo";
gid = config.ids.gids.polipo;
members = [ "polipo" ];
+2 -2
nixos/modules/services/networking/prayer.nix
···
config = mkIf config.services.prayer.enable {
environment.systemPackages = [ prayer ];
-
users.extraUsers = singleton
+
users.users = singleton
{ name = prayerUser;
uid = config.ids.uids.prayer;
description = "Prayer daemon user";
home = stateDir;
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = prayerGroup;
gid = config.ids.gids.prayer;
};
+2 -2
nixos/modules/services/networking/prosody.nix
···
'') cfg.virtualHosts) }
'';
-
users.extraUsers.prosody = mkIf (cfg.user == "prosody") {
+
users.users.prosody = mkIf (cfg.user == "prosody") {
uid = config.ids.uids.prosody;
description = "Prosody user";
createHome = true;
···
home = "${cfg.dataDir}";
};
-
users.extraGroups.prosody = mkIf (cfg.group == "prosody") {
+
users.groups.prosody = mkIf (cfg.group == "prosody") {
gid = config.ids.gids.prosody;
};
+2 -2
nixos/modules/services/networking/quassel.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = mkIf (cfg.user == null) [
+
users.users = mkIf (cfg.user == null) [
{ name = "quassel";
description = "Quassel IRC client daemon";
group = "quassel";
uid = config.ids.uids.quassel;
}];
-
users.extraGroups = mkIf (cfg.user == null) [
+
users.groups = mkIf (cfg.user == null) [
{ name = "quassel";
gid = config.ids.gids.quassel;
}];
+2 -2
nixos/modules/services/networking/radicale.nix
···
config = mkIf cfg.enable {
environment.systemPackages = [ cfg.package ];
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "radicale";
uid = config.ids.uids.radicale;
description = "radicale user";
···
createHome = true;
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "radicale";
gid = config.ids.gids.radicale;
};
+1 -1
nixos/modules/services/networking/radvd.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.radvd =
+
users.users.radvd =
{ uid = config.ids.uids.radvd;
description = "Router Advertisement Daemon User";
};
+1 -1
nixos/modules/services/networking/rdnssd.nix
···
};
};
-
users.extraUsers.rdnssd = {
+
users.users.rdnssd = {
description = "RDNSSD Daemon User";
uid = config.ids.uids.rdnssd;
};
+2 -2
nixos/modules/services/networking/resilio.nix
···
}
];
-
users.extraUsers.rslsync = {
+
users.users.rslsync = {
description = "Resilio Sync Service user";
home = cfg.storagePath;
createHome = true;
···
group = "rslsync";
};
-
users.extraGroups = [ { name = "rslsync"; } ];
+
users.groups = [ { name = "rslsync"; } ];
systemd.services.resilio = with pkgs; {
description = "Resilio Sync Service";
+1 -1
nixos/modules/services/networking/rpcbind.nix
···
wantedBy = [ "multi-user.target" ];
};
-
users.extraUsers.rpc = {
+
users.users.rpc = {
group = "nogroup";
uid = config.ids.uids.rpc;
};
+2 -2
nixos/modules/services/networking/sabnzbd.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.sabnzbd = {
+
users.users.sabnzbd = {
uid = config.ids.uids.sabnzbd;
group = "sabnzbd";
description = "sabnzbd user";
···
createHome = true;
};
-
users.extraGroups.sabnzbd = {
+
users.groups.sabnzbd = {
gid = config.ids.gids.sabnzbd;
};
+2 -2
nixos/modules/services/networking/searx.nix
···
config = mkIf config.services.searx.enable {
-
users.extraUsers.searx =
+
users.users.searx =
{ uid = config.ids.uids.searx;
description = "Searx user";
createHome = true;
home = "/var/lib/searx";
};
-
users.extraGroups.searx =
+
users.groups.searx =
{ gid = config.ids.gids.searx;
};
+2 -2
nixos/modules/services/networking/seeks.nix
···
config = mkIf config.services.seeks.enable {
-
users.extraUsers.seeks =
+
users.users.seeks =
{ uid = config.ids.uids.seeks;
description = "Seeks user";
createHome = true;
home = "/var/lib/seeks";
};
-
users.extraGroups.seeks =
+
users.groups.seeks =
{ gid = config.ids.gids.seeks;
};
+1 -1
nixos/modules/services/networking/shairport-sync.nix
···
services.avahi.publish.enable = true;
services.avahi.publish.userServices = true;
-
users.extraUsers = singleton
+
users.users = singleton
{ name = cfg.user;
description = "Shairport user";
isSystemUser = true;
+1 -1
nixos/modules/services/networking/shout.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "shout";
uid = config.ids.uids.shout;
description = "Shout daemon user";
+1 -1
nixos/modules/services/networking/smokeping.nix
···
"fping6".source = "${pkgs.fping}/bin/fping6";
};
environment.systemPackages = [ pkgs.fping ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = cfg.user;
isNormalUser = false;
isSystemUser = true;
+2 -2
nixos/modules/services/networking/sniproxy.nix
···
};
};
-
users.extraUsers = mkIf (cfg.user == "sniproxy") {
+
users.users = mkIf (cfg.user == "sniproxy") {
sniproxy = {
group = cfg.group;
uid = config.ids.uids.sniproxy;
};
};
-
users.extraGroups = mkIf (cfg.group == "sniproxy") {
+
users.groups = mkIf (cfg.group == "sniproxy") {
sniproxy = {
gid = config.ids.gids.sniproxy;
};
+2 -2
nixos/modules/services/networking/spiped.nix
···
message = "A pipe must either encrypt or decrypt";
}) cfg.config;
-
users.extraGroups.spiped.gid = config.ids.gids.spiped;
-
users.extraUsers.spiped = {
+
users.groups.spiped.gid = config.ids.gids.spiped;
+
users.users.spiped = {
description = "Secure Pipe Service user";
group = "spiped";
uid = config.ids.uids.spiped;
+2 -2
nixos/modules/services/networking/ssh/sshd.nix
···
${concatMapStrings (f: readFile f + "\n") u.openssh.authorizedKeys.keyFiles}
'';
};
-
usersWithKeys = attrValues (flip filterAttrs config.users.extraUsers (n: u:
+
usersWithKeys = attrValues (flip filterAttrs config.users.users (n: u:
length u.openssh.authorizedKeys.keys != 0 || length u.openssh.authorizedKeys.keyFiles != 0
));
in listToAttrs (map mkAuthKeyFile usersWithKeys);
···
config = mkIf cfg.enable {
-
users.extraUsers.sshd =
+
users.users.sshd =
{ isSystemUser = true;
description = "SSH privilege separation user";
};
+2 -2
nixos/modules/services/networking/supybot.nix
···
environment.systemPackages = [ pkgs.pythonPackages.limnoria ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "supybot";
uid = config.ids.uids.supybot;
group = "supybot";
···
createHome = true;
};
-
users.extraGroups.supybot = {
+
users.groups.supybot = {
name = "supybot";
gid = config.ids.gids.supybot;
};
+2 -2
nixos/modules/services/networking/syncthing.nix
···
systemd.packages = [ pkgs.syncthing ];
users = mkIf (cfg.user == defaultUser) {
-
extraUsers."${defaultUser}" =
+
users."${defaultUser}" =
{ group = cfg.group;
home = cfg.dataDir;
createHome = true;
···
description = "Syncthing daemon user";
};
-
extraGroups."${defaultUser}".gid =
+
groups."${defaultUser}".gid =
config.ids.gids.syncthing;
};
+1 -1
nixos/modules/services/networking/tcpcrypt.nix
···
config = mkIf cfg.enable {
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "tcpcryptd";
uid = config.ids.uids.tcpcryptd;
description = "tcpcrypt daemon user";
+1 -1
nixos/modules/services/networking/tinc.nix
···
};
in [ cli-wrappers ];
-
users.extraUsers = flip mapAttrs' cfg.networks (network: _:
+
users.users = flip mapAttrs' cfg.networks (network: _:
nameValuePair ("tinc.${network}") ({
description = "Tinc daemon user for ${network}";
isSystemUser = true;
+1 -1
nixos/modules/services/networking/tinydns.nix
···
config = mkIf config.services.tinydns.enable {
environment.systemPackages = [ pkgs.djbdns ];
-
users.extraUsers.tinydns = {};
+
users.users.tinydns = {};
systemd.services.tinydns = {
description = "djbdns tinydns server";
+1 -1
nixos/modules/services/networking/tox-bootstrapd.nix
···
config = mkIf config.services.toxBootstrapd.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "tox-bootstrapd";
uid = config.ids.uids.tox-bootstrapd;
description = "Tox bootstrap daemon user";
+1 -1
nixos/modules/services/networking/toxvpn.nix
···
environment.systemPackages = [ pkgs.toxvpn ];
-
users.extraUsers = {
+
users.users = {
toxvpn = {
uid = config.ids.uids.toxvpn;
home = "/var/lib/toxvpn";
+2 -2
nixos/modules/services/networking/tvheadend.nix
···
with lib;
let cfg = config.services.tvheadend;
-
pidFile = "${config.users.extraUsers.tvheadend.home}/tvheadend.pid";
+
pidFile = "${config.users.users.tvheadend.home}/tvheadend.pid";
in
{
···
};
config = mkIf cfg.enable {
-
users.extraUsers.tvheadend = {
+
users.users.tvheadend = {
description = "Tvheadend Service user";
home = "/var/lib/tvheadend";
createHome = true;
+1 -1
nixos/modules/services/networking/unifi.nix
···
config = mkIf cfg.enable {
-
users.extraUsers.unifi = {
+
users.users.unifi = {
uid = config.ids.uids.unifi;
description = "UniFi controller daemon user";
home = "${stateDir}";
+2 -2
nixos/modules/services/networking/vsftpd.nix
···
message = "vsftpd: If forceLocalLoginsSSL or forceLocalDataSSL is true then a rsaCertFile must be provided!";
};
-
users.extraUsers =
+
users.users =
[ { name = "vsftpd";
uid = config.ids.uids.vsftpd;
description = "VSFTPD user";
···
home = cfg.anonymousUserHome;
};
-
users.extraGroups.ftp.gid = config.ids.gids.ftp;
+
users.groups.ftp.gid = config.ids.gids.ftp;
# If you really have to access root via FTP use mkOverride or userlistDeny
# = false and whitelist root
+2 -2
nixos/modules/services/networking/znc.nix
···
script = "${pkgs.znc}/bin/znc --foreground --datadir ${cfg.dataDir} ${toString cfg.extraFlags}";
};
-
users.extraUsers = optional (cfg.user == defaultUser)
+
users.users = optional (cfg.user == defaultUser)
{ name = defaultUser;
description = "ZNC server daemon owner";
group = defaultUser;
···
createHome = true;
};
-
users.extraGroups = optional (cfg.user == defaultUser)
+
users.groups = optional (cfg.user == defaultUser)
{ name = defaultUser;
gid = config.ids.gids.znc;
members = [ defaultUser ];
+1 -1
nixos/modules/services/printing/cupsd.nix
···
config = mkIf config.services.printing.enable {
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "cups";
uid = config.ids.uids.cups;
group = "lp";
+2 -2
nixos/modules/services/scheduling/atd.nix
···
security.pam.services.atd = {};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "atd";
uid = config.ids.uids.atd;
description = "atd user";
home = "/var/empty";
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "atd";
gid = config.ids.gids.atd;
};
+1 -1
nixos/modules/services/scheduling/chronos.nix
···
};
};
-
users.extraUsers.chronos.uid = config.ids.uids.chronos;
+
users.users.chronos.uid = config.ids.uids.chronos;
};
}
+1 -1
nixos/modules/services/scheduling/fcron.nix
···
];
environment.systemPackages = [ pkgs.fcron ];
-
users.extraUsers.fcron = {
+
users.users.fcron = {
uid = config.ids.uids.fcron;
home = "/var/spool/fcron";
group = "fcron";
+1 -1
nixos/modules/services/scheduling/marathon.nix
···
};
};
-
users.extraUsers.${cfg.user} = { };
+
users.users.${cfg.user} = { };
};
}
+2 -2
nixos/modules/services/search/hound.nix
···
};
config = mkIf cfg.enable {
-
users.extraGroups = optional (cfg.group == "hound") {
+
users.groups = optional (cfg.group == "hound") {
name = "hound";
gid = config.ids.gids.hound;
};
-
users.extraUsers = optional (cfg.user == "hound") {
+
users.users = optional (cfg.user == "hound") {
name = "hound";
description = "hound code search";
createHome = true;
+1 -1
nixos/modules/services/search/kibana.nix
···
environment.systemPackages = [ cfg.package ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = "kibana";
uid = config.ids.uids.kibana;
description = "Kibana service user";
+2 -2
nixos/modules/services/security/clamav.nix
···
config = mkIf (cfg.updater.enable || cfg.daemon.enable) {
environment.systemPackages = [ pkg ];
-
users.extraUsers = singleton {
+
users.users = singleton {
name = clamavUser;
uid = config.ids.uids.clamav;
group = clamavGroup;
···
home = stateDir;
};
-
users.extraGroups = singleton {
+
users.groups = singleton {
name = clamavGroup;
gid = config.ids.gids.clamav;
};
+2 -2
nixos/modules/services/security/fprot.nix
···
target = "f-prot.conf";
};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = fprotUser;
uid = config.ids.uids.fprot;
description = "F-Prot daemon user";
home = stateDir;
};
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = fprotGroup;
gid = config.ids.gids.fprot;
};
+1 -1
nixos/modules/services/security/oauth2_proxy.nix
···
cookie.secret = mkDefault null;
};
-
users.extraUsers.oauth2_proxy = {
+
users.users.oauth2_proxy = {
description = "OAuth2 Proxy";
};
+2 -2
nixos/modules/services/security/tor.nix
···
always create a container/VM with a separate Tor daemon instance.
'';
-
users.extraGroups.tor.gid = config.ids.gids.tor;
-
users.extraUsers.tor =
+
users.groups.tor.gid = config.ids.gids.tor;
+
users.users.tor =
{ description = "Tor Daemon User";
createHome = true;
home = torDirectory;
+2 -2
nixos/modules/services/security/vault.nix
···
}
];
-
users.extraUsers.vault = {
+
users.users.vault = {
name = "vault";
group = "vault";
uid = config.ids.uids.vault;
description = "Vault daemon user";
};
-
users.extraGroups.vault.gid = config.ids.gids.vault;
+
users.groups.vault.gid = config.ids.gids.vault;
systemd.services.vault = {
description = "Vault server daemon";
+2 -2
nixos/modules/services/system/dbus.nix
···
target = "dbus-1";
};
-
users.extraUsers.messagebus = {
+
users.users.messagebus = {
uid = config.ids.uids.messagebus;
description = "D-Bus system message bus daemon user";
home = homeDir;
group = "messagebus";
};
-
users.extraGroups.messagebus.gid = config.ids.gids.messagebus;
+
users.groups.messagebus.gid = config.ids.gids.messagebus;
systemd.packages = [ pkgs.dbus.daemon ];
+1 -1
nixos/modules/services/system/nscd.nix
···
config = mkIf cfg.enable {
environment.etc."nscd.conf".text = cfg.config;
-
users.extraUsers.nscd =
+
users.users.nscd =
{ isSystemUser = true;
description = "Name service cache daemon user";
};
+1 -1
nixos/modules/services/system/uptimed.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.uptimed = {
+
users.users.uptimed = {
description = "Uptimed daemon user";
home = stateDir;
createHome = true;
+2 -2
nixos/modules/services/torrent/deluge.nix
···
environment.systemPackages = [ pkgs.deluge ];
-
users.extraUsers.deluge = {
+
users.users.deluge = {
group = "deluge";
uid = config.ids.uids.deluge;
home = "/var/lib/deluge/";
···
description = "Deluge Daemon user";
};
-
users.extraGroups.deluge.gid = config.ids.gids.deluge;
+
users.groups.deluge.gid = config.ids.gids.deluge;
};
}
+1 -1
nixos/modules/services/torrent/peerflix.nix
···
};
};
-
users.extraUsers.peerflix.uid = config.ids.uids.peerflix;
+
users.users.peerflix.uid = config.ids.uids.peerflix;
};
}
+2 -2
nixos/modules/services/torrent/transmission.nix
···
# It's useful to have transmission in path, e.g. for remote control
environment.systemPackages = [ pkgs.transmission ];
-
users.extraGroups.transmission.gid = config.ids.gids.transmission;
-
users.extraUsers.transmission = {
+
users.groups.transmission.gid = config.ids.gids.transmission;
+
users.users.transmission = {
group = "transmission";
uid = config.ids.uids.transmission;
description = "Transmission BitTorrent user";
+2 -2
nixos/modules/services/web-apps/atlassian/confluence.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers."${cfg.user}" = {
+
users.users."${cfg.user}" = {
isSystemUser = true;
group = cfg.group;
};
-
users.extraGroups."${cfg.group}" = {};
+
users.groups."${cfg.group}" = {};
systemd.services.confluence = {
description = "Atlassian Confluence";
+2 -2
nixos/modules/services/web-apps/atlassian/crowd.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers."${cfg.user}" = {
+
users.users."${cfg.user}" = {
isSystemUser = true;
group = cfg.group;
};
-
users.extraGroups."${cfg.group}" = {};
+
users.groups."${cfg.group}" = {};
systemd.services.atlassian-crowd = {
description = "Atlassian Crowd";
+2 -2
nixos/modules/services/web-apps/atlassian/jira.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers."${cfg.user}" = {
+
users.users."${cfg.user}" = {
isSystemUser = true;
group = cfg.group;
};
-
users.extraGroups."${cfg.group}" = {};
+
users.groups."${cfg.group}" = {};
systemd.services.atlassian-jira = {
description = "Atlassian JIRA";
+2 -2
nixos/modules/services/web-apps/frab.nix
···
config = mkIf cfg.enable {
environment.systemPackages = [ frab-rake ];
-
users.extraUsers = [
+
users.users = [
{ name = cfg.user;
group = cfg.group;
home = "${cfg.statePath}";
}
];
-
users.extraGroups = [ { name = cfg.group; } ];
+
users.groups = [ { name = cfg.group; } ];
systemd.services.frab = {
after = [ "network.target" "gitlab.service" ];
+2 -2
nixos/modules/services/web-apps/matomo.nix
···
message = "Either services.matomo.nginx or services.matomo.nginx.webServerUser is mandatory";
}];
-
users.extraUsers.${user} = {
+
users.users.${user} = {
isSystemUser = true;
createHome = true;
home = dataDir;
group = user;
};
-
users.extraGroups.${user} = {};
+
users.groups.${user} = {};
systemd.services.matomo_setup_update = {
# everything needs to set up and up to date before matomo php files are executed
+2 -2
nixos/modules/services/web-apps/mattermost.nix
···
config = mkMerge [
(mkIf cfg.enable {
-
users.extraUsers = optionalAttrs (cfg.user == "mattermost") (singleton {
+
users.users = optionalAttrs (cfg.user == "mattermost") (singleton {
name = "mattermost";
group = cfg.group;
uid = config.ids.uids.mattermost;
home = cfg.statePath;
});
-
users.extraGroups = optionalAttrs (cfg.group == "mattermost") (singleton {
+
users.groups = optionalAttrs (cfg.group == "mattermost") (singleton {
name = "mattermost";
gid = config.ids.gids.mattermost;
});
+2 -2
nixos/modules/services/web-apps/nexus.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers."${cfg.user}" = {
+
users.users."${cfg.user}" = {
isSystemUser = true;
group = cfg.group;
};
-
users.extraGroups."${cfg.group}" = {};
+
users.groups."${cfg.group}" = {};
systemd.services.nexus = {
description = "Sonatype Nexus3";
+2 -2
nixos/modules/services/web-apps/restya-board.nix
···
'';
};
-
users.extraUsers.restya-board = {
+
users.users.restya-board = {
isSystemUser = true;
createHome = false;
home = runDir;
group = "restya-board";
};
-
users.extraGroups.restya-board = {};
+
users.groups.restya-board = {};
services.postgresql.enable = mkIf (isNull cfg.database.host) true;
+2 -2
nixos/modules/services/web-apps/tt-rss.nix
···
};
users = optionalAttrs (cfg.user == "tt_rss") {
-
extraUsers.tt_rss.group = "tt_rss";
-
extraGroups.tt_rss = {};
+
users.tt_rss.group = "tt_rss";
+
groups.tt_rss = {};
};
};
}
+1 -1
nixos/modules/services/web-apps/virtlyst.nix
···
};
config = mkIf cfg.enable {
-
users.extraUsers.virtlyst = {
+
users.users.virtlyst = {
home = stateDir;
createHome = true;
group = mkIf config.virtualisation.libvirtd.enable "libvirtd";
+2 -2
nixos/modules/services/web-servers/apache-httpd/default.nix
···
warnings = map (cfg: ''apache-httpd's port option is deprecated. Use listen = [{/*ip = "*"; */ port = ${toString cfg.port}";}]; instead'' ) (lib.filter (cfg: cfg.port != 0) allHosts);
-
users.extraUsers = optionalAttrs (mainCfg.user == "wwwrun") (singleton
+
users.users = optionalAttrs (mainCfg.user == "wwwrun") (singleton
{ name = "wwwrun";
group = mainCfg.group;
description = "Apache httpd user";
uid = config.ids.uids.wwwrun;
});
-
users.extraGroups = optionalAttrs (mainCfg.group == "wwwrun") (singleton
+
users.groups = optionalAttrs (mainCfg.group == "wwwrun") (singleton
{ name = "wwwrun";
gid = config.ids.gids.wwwrun;
});
+2 -2
nixos/modules/services/web-servers/caddy.nix
···
};
};
-
users.extraUsers.caddy = {
+
users.users.caddy = {
group = "caddy";
uid = config.ids.uids.caddy;
home = cfg.dataDir;
createHome = true;
};
-
users.extraGroups.caddy.gid = config.ids.uids.caddy;
+
users.groups.caddy.gid = config.ids.uids.caddy;
};
}
+2 -2
nixos/modules/services/web-servers/hitch/default.nix
···
environment.systemPackages = [ pkgs.hitch ];
-
users.extraUsers.hitch.group = "hitch";
-
users.extraGroups.hitch = {};
+
users.users.hitch.group = "hitch";
+
users.groups.hitch = {};
};
}
+2 -2
nixos/modules/services/web-servers/lighttpd/default.nix
···
serviceConfig.KillSignal = "SIGINT";
};
-
users.extraUsers.lighttpd = {
+
users.users.lighttpd = {
group = "lighttpd";
description = "lighttpd web server privilege separation user";
uid = config.ids.uids.lighttpd;
};
-
users.extraGroups.lighttpd.gid = config.ids.gids.lighttpd;
+
users.groups.lighttpd.gid = config.ids.gids.lighttpd;
};
}
+1 -1
nixos/modules/services/web-servers/lighttpd/inginious.nix
···
storageDriver = mkDefault "overlay";
};
-
users.extraUsers."lighttpd".extraGroups = [ "docker" ];
+
users.users."lighttpd".extraGroups = [ "docker" ];
# Ensure that docker has pulled the required images.
systemd.services.inginious-prefetch = {
+2 -2
nixos/modules/services/web-servers/meguca.nix
···
};
users = {
-
extraUsers.meguca = {
+
users.meguca = {
description = "meguca server service user";
home = cfg.baseDir;
createHome = true;
···
uid = config.ids.uids.meguca;
};
-
extraGroups.meguca = {
+
groups.meguca = {
gid = config.ids.gids.meguca;
members = [ "meguca" ];
};
+2 -2
nixos/modules/services/web-servers/mighttpd2.nix
···
};
};
-
users.extraUsers.mighttpd2 = {
+
users.users.mighttpd2 = {
group = "mighttpd2";
uid = config.ids.uids.mighttpd2;
isSystemUser = true;
};
-
users.extraGroups.mighttpd2.gid = config.ids.gids.mighttpd2;
+
users.groups.mighttpd2.gid = config.ids.gids.mighttpd2;
};
meta.maintainers = with lib.maintainers; [ fgaz ];
+2 -2
nixos/modules/services/web-servers/minio.nix
···
};
};
-
users.extraUsers.minio = {
+
users.users.minio = {
group = "minio";
uid = config.ids.uids.minio;
};
-
users.extraGroups.minio.gid = config.ids.uids.minio;
+
users.groups.minio.gid = config.ids.uids.minio;
};
}
+2 -2
nixos/modules/services/web-servers/nginx/default.nix
···
listToAttrs acmePairs
);
-
users.extraUsers = optionalAttrs (cfg.user == "nginx") (singleton
+
users.users = optionalAttrs (cfg.user == "nginx") (singleton
{ name = "nginx";
group = cfg.group;
uid = config.ids.uids.nginx;
});
-
users.extraGroups = optionalAttrs (cfg.group == "nginx") (singleton
+
users.groups = optionalAttrs (cfg.group == "nginx") (singleton
{ name = "nginx";
gid = config.ids.gids.nginx;
});
+2 -2
nixos/modules/services/web-servers/tomcat.nix
···
config = mkIf config.services.tomcat.enable {
-
users.extraGroups = singleton
+
users.groups = singleton
{ name = "tomcat";
gid = config.ids.gids.tomcat;
};
-
users.extraUsers = singleton
+
users.users = singleton
{ name = "tomcat";
uid = config.ids.uids.tomcat;
description = "Tomcat user";
+2 -2
nixos/modules/services/web-servers/traefik.nix
···
};
};
-
users.extraUsers.traefik = {
+
users.users.traefik = {
group = "traefik";
home = cfg.dataDir;
createHome = true;
};
-
users.extraGroups.traefik = {};
+
users.groups.traefik = {};
};
}
+2 -2
nixos/modules/services/web-servers/uwsgi.nix
···
};
};
-
users.extraUsers = optionalAttrs (cfg.user == "uwsgi") (singleton
+
users.users = optionalAttrs (cfg.user == "uwsgi") (singleton
{ name = "uwsgi";
group = cfg.group;
uid = config.ids.uids.uwsgi;
});
-
users.extraGroups = optionalAttrs (cfg.group == "uwsgi") (singleton
+
users.groups = optionalAttrs (cfg.group == "uwsgi") (singleton
{ name = "uwsgi";
gid = config.ids.gids.uwsgi;
});
+2 -2
nixos/modules/services/web-servers/varnish/default.nix
···
})
];
-
users.extraUsers.varnish = {
+
users.users.varnish = {
group = "varnish";
uid = config.ids.uids.varnish;
};
-
users.extraGroups.varnish.gid = config.ids.uids.varnish;
+
users.groups.varnish.gid = config.ids.uids.varnish;
};
}
+1 -1
nixos/modules/services/web-servers/zope2.nix
···
config = mkIf (cfg.instances != {}) {
-
users.extraUsers.zope2.uid = config.ids.uids.zope2;
+
users.users.zope2.uid = config.ids.uids.zope2;
systemd.services =
let
+2 -2
nixos/modules/services/x11/display-managers/gdm.nix
···
services.xserver.displayManager.slim.enable = false;
-
users.extraUsers.gdm =
+
users.users.gdm =
{ name = "gdm";
uid = config.ids.uids.gdm;
group = "gdm";
···
description = "GDM user";
};
-
users.extraGroups.gdm.gid = config.ids.gids.gdm;
+
users.groups.gdm.gid = config.ids.gids.gdm;
# GDM needs different xserverArgs, presumable because using wayland by default.
services.xserver.tty = null;
+3 -3
nixos/modules/services/x11/display-managers/lightdm.nix
···
''
[LightDM]
${optionalString cfg.greeter.enable ''
-
greeter-user = ${config.users.extraUsers.lightdm.name}
+
greeter-user = ${config.users.users.lightdm.name}
greeters-directory = ${cfg.greeter.package}
''}
sessions-directory = ${dmcfg.session.desktops}
···
session include lightdm
'';
-
users.extraUsers.lightdm = {
+
users.users.lightdm = {
createHome = true;
home = "/var/lib/lightdm-data";
group = "lightdm";
uid = config.ids.uids.lightdm;
};
-
users.extraGroups.lightdm.gid = config.ids.gids.lightdm;
+
users.groups.lightdm.gid = config.ids.gids.lightdm;
services.xserver.tty = null; # We might start multiple X servers so let the tty increment themselves..
services.xserver.display = null; # We specify our own display (and logfile) in xserver-wrapper up there
};
+2 -2
nixos/modules/services/x11/display-managers/sddm.nix
···
'';
};
-
users.extraUsers.sddm = {
+
users.users.sddm = {
createHome = true;
home = "/var/lib/sddm";
group = "sddm";
···
environment.etc."sddm.conf".source = cfgFile;
-
users.extraGroups.sddm.gid = config.ids.gids.sddm;
+
users.groups.sddm.gid = config.ids.gids.sddm;
environment.systemPackages = [ sddm ];
services.dbus.packages = [ sddm ];
+1 -1
nixos/modules/system/boot/initrd-ssh.nix
···
boot.initrd.network.ssh.authorizedKeys = mkOption {
type = types.listOf types.str;
-
default = config.users.extraUsers.root.openssh.authorizedKeys.keys;
+
default = config.users.users.root.openssh.authorizedKeys.keys;
description = ''
Authorized keys for the root user on initrd.
'';
+8 -8
nixos/modules/system/boot/systemd.nix
···
mkdir -m 0700 -p /var/log/journal
'';
-
users.extraUsers.systemd-network.uid = config.ids.uids.systemd-network;
-
users.extraGroups.systemd-network.gid = config.ids.gids.systemd-network;
-
users.extraUsers.systemd-resolve.uid = config.ids.uids.systemd-resolve;
-
users.extraGroups.systemd-resolve.gid = config.ids.gids.systemd-resolve;
+
users.users.systemd-network.uid = config.ids.uids.systemd-network;
+
users.groups.systemd-network.gid = config.ids.gids.systemd-network;
+
users.users.systemd-resolve.uid = config.ids.uids.systemd-resolve;
+
users.groups.systemd-resolve.gid = config.ids.gids.systemd-resolve;
# Target for ‘charon send-keys’ to hook into.
-
users.extraGroups.keys.gid = config.ids.gids.keys;
+
users.groups.keys.gid = config.ids.gids.keys;
systemd.targets.keys =
{ description = "Security Keys";
···
"TMPFS_XATTR" "SECCOMP"
];
-
users.extraGroups.systemd-journal.gid = config.ids.gids.systemd-journal;
-
users.extraUsers.systemd-journal-gateway.uid = config.ids.uids.systemd-journal-gateway;
-
users.extraGroups.systemd-journal-gateway.gid = config.ids.gids.systemd-journal-gateway;
+
users.groups.systemd-journal.gid = config.ids.gids.systemd-journal;
+
users.users.systemd-journal-gateway.uid = config.ids.uids.systemd-journal-gateway;
+
users.groups.systemd-journal-gateway.gid = config.ids.gids.systemd-journal-gateway;
# Generate timer units for all services that have a ‘startAt’ value.
systemd.timers =
+2 -2
nixos/modules/system/boot/timesyncd.nix
···
NTP=${concatStringsSep " " config.services.timesyncd.servers}
'';
-
users.extraUsers.systemd-timesync.uid = config.ids.uids.systemd-timesync;
-
users.extraGroups.systemd-timesync.gid = config.ids.gids.systemd-timesync;
+
users.users.systemd-timesync.uid = config.ids.uids.systemd-timesync;
+
users.groups.systemd-timesync.gid = config.ids.gids.systemd-timesync;
};
+1 -1
nixos/modules/testing/test-instrumentation.nix
···
networking.usePredictableInterfaceNames = false;
# Make it easy to log in as root when running the test interactively.
-
users.extraUsers.root.initialHashedPassword = mkOverride 150 "";
+
users.users.root.initialHashedPassword = mkOverride 150 "";
services.xserver.displayManager.job.logToJournal = true;
+1 -1
nixos/modules/virtualisation/docker.nix
···
config = mkIf cfg.enable (mkMerge [{
environment.systemPackages = [ cfg.package ];
-
users.extraGroups.docker.gid = config.ids.gids.docker;
+
users.groups.docker.gid = config.ids.gids.docker;
systemd.packages = [ cfg.package ];
systemd.services.docker = {
+1 -1
nixos/modules/virtualisation/libvirtd.nix
···
boot.kernelModules = [ "tun" ];
-
users.extraGroups.libvirtd.gid = config.ids.gids.libvirtd;
+
users.groups.libvirtd.gid = config.ids.gids.libvirtd;
systemd.packages = [ pkgs.libvirt ];
+1 -1
nixos/modules/virtualisation/lxc-container.nix
···
];
# Allow the user to login as root without password.
-
users.extraUsers.root.initialHashedPassword = mkOverride 150 "";
+
users.users.root.initialHashedPassword = mkOverride 150 "";
# Some more help text.
services.mingetty.helpLine =
+2 -2
nixos/modules/virtualisation/lxd.nix
···
};
-
users.extraGroups.lxd.gid = config.ids.gids.lxd;
+
users.groups.lxd.gid = config.ids.gids.lxd;
-
users.extraUsers.root = {
+
users.users.root = {
subUidRanges = [ { startUid = 1000000; count = 65536; } ];
subGidRanges = [ { startGid = 1000000; count = 65536; } ];
};
+1 -1
nixos/modules/virtualisation/rkt.nix
···
};
};
-
users.extraGroups.rkt = {};
+
users.groups.rkt = {};
};
}
+1 -1
nixos/modules/virtualisation/virtualbox-guest.nix
···
boot.supportedFilesystems = [ "vboxsf" ];
boot.initrd.supportedFilesystems = [ "vboxsf" ];
-
users.extraGroups.vboxsf.gid = config.ids.gids.vboxsf;
+
users.groups.vboxsf.gid = config.ids.gids.vboxsf;
systemd.services.virtualbox =
{ description = "VirtualBox Guest Services";
+1 -1
nixos/modules/virtualisation/virtualbox-host.nix
···
"VirtualBox"
]));
-
users.extraGroups.vboxusers.gid = config.ids.gids.vboxusers;
+
users.groups.vboxusers.gid = config.ids.gids.vboxusers;
services.udev.extraRules =
''