Merge pull request #138441 from symphorien/nonogroup-fixes-2

Fixes after #133166

authored by Guillaume Girol and committed by GitHub 07d82812 e89c396d

+32 -16
+7 -7
nixos/modules/misc/ids.nix
··· 153 #btsync = 113; # unused 154 #minecraft = 114; #dynamically allocated as of 2021-09-03 155 vault = 115; 156 - rippled = 116; 157 murmur = 117; 158 foundationdb = 118; 159 newrelic = 119; ··· 217 #redis = 181; removed 2018-01-03 218 #unifi = 183; dynamically allocated as of 2021-09-17 219 uptimed = 184; 220 - zope2 = 185; 221 - ripple-data-api = 186; 222 mediatomb = 187; 223 - rdnssd = 188; 224 ihaskell = 189; 225 i2p = 190; 226 lambdabot = 191; ··· 231 skydns = 197; 232 # ripple-rest = 198; # unused, removed 2017-08-12 233 # nix-serve = 199; # unused, removed 2020-12-12 234 - tvheadend = 200; 235 uwsgi = 201; 236 gitit = 202; 237 riemanntools = 203; 238 subsonic = 204; 239 riak = 205; 240 - shout = 206; 241 gateone = 207; 242 namecoin = 208; 243 #lxd = 210; # unused ··· 276 sniproxy = 244; 277 nzbget = 245; 278 mosquitto = 246; 279 - toxvpn = 247; 280 # squeezelite = 248; # DynamicUser = true 281 turnserver = 249; 282 #smokeping = 250;# dynamically allocated as of 2021-09-03
··· 153 #btsync = 113; # unused 154 #minecraft = 114; #dynamically allocated as of 2021-09-03 155 vault = 115; 156 + # rippled = 116; #dynamically allocated as of 2021-09-18 157 murmur = 117; 158 foundationdb = 118; 159 newrelic = 119; ··· 217 #redis = 181; removed 2018-01-03 218 #unifi = 183; dynamically allocated as of 2021-09-17 219 uptimed = 184; 220 + #zope2 = 185; # dynamically allocated as of 2021-09-18 221 + #ripple-data-api = 186; dynamically allocated as of 2021-09-17 222 mediatomb = 187; 223 + #rdnssd = 188; #dynamically allocated as of 2021-09-18 224 ihaskell = 189; 225 i2p = 190; 226 lambdabot = 191; ··· 231 skydns = 197; 232 # ripple-rest = 198; # unused, removed 2017-08-12 233 # nix-serve = 199; # unused, removed 2020-12-12 234 + #tvheadend = 200; # dynamically allocated as of 2021-09-18 235 uwsgi = 201; 236 gitit = 202; 237 riemanntools = 203; 238 subsonic = 204; 239 riak = 205; 240 + #shout = 206; # dynamically allocated as of 2021-09-18 241 gateone = 207; 242 namecoin = 208; 243 #lxd = 210; # unused ··· 276 sniproxy = 244; 277 nzbget = 245; 278 mosquitto = 246; 279 + #toxvpn = 247; # dynamically allocated as of 2021-09-18 280 # squeezelite = 248; # DynamicUser = true 281 turnserver = 249; 282 #smokeping = 250;# dynamically allocated as of 2021-09-03
+3 -1
nixos/modules/services/misc/ripple-data-api.nix
··· 187 188 users.users.ripple-data-api = 189 { description = "Ripple data api user"; 190 - uid = config.ids.uids.ripple-data-api; 191 }; 192 }; 193 }
··· 187 188 users.users.ripple-data-api = 189 { description = "Ripple data api user"; 190 + isSystemUser = true; 191 + group = "ripple-data-api"; 192 }; 193 + users.groups.ripple-data-api = {}; 194 }; 195 }
+5 -3
nixos/modules/services/misc/rippled.nix
··· 407 408 config = mkIf cfg.enable { 409 410 - users.users.rippled = 411 - { description = "Ripple server user"; 412 - uid = config.ids.uids.rippled; 413 home = cfg.databasePath; 414 createHome = true; 415 }; 416 417 systemd.services.rippled = { 418 after = [ "network.target" ];
··· 407 408 config = mkIf cfg.enable { 409 410 + users.users.rippled = { 411 + description = "Ripple server user"; 412 + isSystemUser = true; 413 + group = "rippled"; 414 home = cfg.databasePath; 415 createHome = true; 416 }; 417 + users.groups.rippled = {}; 418 419 systemd.services.rippled = { 420 after = [ "network.target" ];
+3 -1
nixos/modules/services/networking/rdnssd.nix
··· 72 73 users.users.rdnssd = { 74 description = "RDNSSD Daemon User"; 75 - uid = config.ids.uids.rdnssd; 76 }; 77 78 }; 79
··· 72 73 users.users.rdnssd = { 74 description = "RDNSSD Daemon User"; 75 + isSystemUser = true; 76 + group = "rdnssd"; 77 }; 78 + users.groups.rdnssd = {}; 79 80 }; 81
+3 -1
nixos/modules/services/networking/shout.nix
··· 83 84 config = mkIf cfg.enable { 85 users.users.shout = { 86 - uid = config.ids.uids.shout; 87 description = "Shout daemon user"; 88 home = shoutHome; 89 createHome = true; 90 }; 91 92 systemd.services.shout = { 93 description = "Shout web IRC client";
··· 83 84 config = mkIf cfg.enable { 85 users.users.shout = { 86 + isSystemUser = true; 87 + group = "shout"; 88 description = "Shout daemon user"; 89 home = shoutHome; 90 createHome = true; 91 }; 92 + users.groups.shout = {}; 93 94 systemd.services.shout = { 95 description = "Shout web IRC client";
+3 -1
nixos/modules/services/networking/toxvpn.nix
··· 59 60 users.users = { 61 toxvpn = { 62 - uid = config.ids.uids.toxvpn; 63 home = "/var/lib/toxvpn"; 64 createHome = true; 65 }; 66 }; 67 }; 68 }
··· 59 60 users.users = { 61 toxvpn = { 62 + isSystemUser = true; 63 + group = "toxvpn"; 64 home = "/var/lib/toxvpn"; 65 createHome = true; 66 }; 67 }; 68 + users.groups.toxvpn = {}; 69 }; 70 }
+3 -1
nixos/modules/services/networking/tvheadend.nix
··· 29 description = "Tvheadend Service user"; 30 home = "/var/lib/tvheadend"; 31 createHome = true; 32 - uid = config.ids.uids.tvheadend; 33 }; 34 35 systemd.services.tvheadend = { 36 description = "Tvheadend TV streaming server";
··· 29 description = "Tvheadend Service user"; 30 home = "/var/lib/tvheadend"; 31 createHome = true; 32 + isSystemUser = true; 33 + group = "tvheadend"; 34 }; 35 + users.groups.tvheadend = {}; 36 37 systemd.services.tvheadend = { 38 description = "Tvheadend TV streaming server";
+5 -1
nixos/modules/services/web-servers/zope2.nix
··· 103 104 config = mkIf (cfg.instances != {}) { 105 106 - users.users.zope2.uid = config.ids.uids.zope2; 107 108 systemd.services = 109 let
··· 103 104 config = mkIf (cfg.instances != {}) { 105 106 + users.users.zope2 = { 107 + isSystemUser = true; 108 + group = "zope2"; 109 + }; 110 + users.groups.zope2 = {}; 111 112 systemd.services = 113 let