nixos/tests: users.(extraUsers|extraGroup->users|group)

This commit is contained in:
Florian Klink 2018-06-30 01:55:42 +02:00
parent 0868aa76f6
commit 89d5d191b4
13 changed files with 17 additions and 17 deletions

View file

@ -9,7 +9,7 @@ import ./make-test.nix ({ pkgs, lib, ... }:
machine = machine =
{ config, pkgs, ... }: { config, pkgs, ... }:
{ services.atd.enable = true; { services.atd.enable = true;
users.extraUsers.alice = { isNormalUser = true; }; users.users.alice = { isNormalUser = true; };
}; };
# "at" has a resolution of 1 minute # "at" has a resolution of 1 minute

View file

@ -1,12 +1,12 @@
{ lib, ... }: { lib, ... }:
{ users.extraUsers.alice = { users.users.alice =
{ isNormalUser = true; { isNormalUser = true;
description = "Alice Foobar"; description = "Alice Foobar";
password = "foobar"; password = "foobar";
}; };
users.extraUsers.bob = users.users.bob =
{ isNormalUser = true; { isNormalUser = true;
description = "Bob Foobar"; description = "Bob Foobar";
password = "foobar"; password = "foobar";

View file

@ -78,8 +78,8 @@ in
# there's nobody around that can input password # there's nobody around that can input password
PreferredAuthentications publickey PreferredAuthentications publickey
''; '';
users.extraUsers.alice = { isNormalUser = true; }; users.users.alice = { isNormalUser = true; };
users.extraUsers.bob = { isNormalUser = true; }; users.users.bob = { isNormalUser = true; };
}; };
}; };

View file

@ -43,7 +43,7 @@ let
boot.loader.systemd-boot.enable = true; boot.loader.systemd-boot.enable = true;
''} ''}
users.extraUsers.alice = { users.users.alice = {
isNormalUser = true; isNormalUser = true;
home = "/home/alice"; home = "/home/alice";
description = "Alice Foobar"; description = "Alice Foobar";

View file

@ -18,7 +18,7 @@ import ./make-test.nix ({ pkgs, ...} : {
# should have no effect # should have no effect
services.jenkinsSlave.enable = true; services.jenkinsSlave.enable = true;
users.extraUsers.jenkins.extraGroups = [ "users" ]; users.users.jenkins.extraGroups = [ "users" ];
systemd.services.jenkins.serviceConfig.TimeoutStartSec = "6min"; systemd.services.jenkins.serviceConfig.TimeoutStartSec = "6min";
}; };
@ -27,7 +27,7 @@ import ./make-test.nix ({ pkgs, ...} : {
{ config, pkgs, ... }: { config, pkgs, ... }:
{ services.jenkinsSlave.enable = true; { services.jenkinsSlave.enable = true;
users.extraUsers.jenkins.extraGroups = [ "users" ]; users.users.jenkins.extraGroups = [ "users" ];
}; };
}; };

View file

@ -16,7 +16,7 @@ import ./make-test.nix ({ pkgs, ...} : {
enableOCR = true; enableOCR = true;
testScript = { nodes, ... }: let testScript = { nodes, ... }: let
user = nodes.machine.config.users.extraUsers.alice; user = nodes.machine.config.users.users.alice;
in '' in ''
startAll; startAll;
$machine->waitForText(qr/${user.description}/); $machine->waitForText(qr/${user.description}/);

View file

@ -17,7 +17,7 @@ in {
services.openssh.enable = true; services.openssh.enable = true;
security.pam.services.sshd.limits = security.pam.services.sshd.limits =
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ]; [ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
users.extraUsers.root.openssh.authorizedKeys.keys = [ users.users.root.openssh.authorizedKeys.keys = [
snakeOilPublicKey snakeOilPublicKey
]; ];
}; };
@ -29,7 +29,7 @@ in {
services.openssh = { enable = true; startWhenNeeded = true; }; services.openssh = { enable = true; startWhenNeeded = true; };
security.pam.services.sshd.limits = security.pam.services.sshd.limits =
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ]; [ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
users.extraUsers.root.openssh.authorizedKeys.keys = [ users.users.root.openssh.authorizedKeys.keys = [
snakeOilPublicKey snakeOilPublicKey
]; ];
}; };

View file

@ -30,7 +30,7 @@ in
enable = true; enable = true;
}; };
users.extraUsers.alice = { users.users.alice = {
isNormalUser = true; isNormalUser = true;
name = "alice"; name = "alice";
uid = 1000; uid = 1000;

View file

@ -41,7 +41,7 @@ import ./make-test.nix ({ pkgs, ...} :
enableOCR = true; enableOCR = true;
testScript = { nodes, ... }: let testScript = { nodes, ... }: let
user = nodes.machine.config.users.extraUsers.alice; user = nodes.machine.config.users.users.alice;
xdo = "${pkgs.xdotool}/bin/xdotool"; xdo = "${pkgs.xdotool}/bin/xdotool";
in '' in ''
startAll; startAll;

View file

@ -21,7 +21,7 @@ let
enableOCR = true; enableOCR = true;
testScript = { nodes, ... }: let testScript = { nodes, ... }: let
user = nodes.machine.config.users.extraUsers.alice; user = nodes.machine.config.users.users.alice;
in '' in ''
startAll; startAll;
$machine->waitForText(qr/select your user/i); $machine->waitForText(qr/select your user/i);

View file

@ -48,7 +48,7 @@ import ./make-test.nix ({ pkgs, ...} : {
enableOCR = true; enableOCR = true;
testScript = { nodes, ... }: let testScript = { nodes, ... }: let
user = nodes.machine.config.users.extraUsers.alice; user = nodes.machine.config.users.users.alice;
in '' in ''
startAll; startAll;
$machine->waitForText(qr/Username:/); $machine->waitForText(qr/Username:/);

View file

@ -14,7 +14,7 @@ in
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
with lib; with lib;
{ {
users.extraGroups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; }; users.groups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; };
users.users = { users.users = {
test0 = { isNormalUser = true; extraGroups = [ "wheel" ]; }; test0 = { isNormalUser = true; extraGroups = [ "wheel" ]; };
test1 = { isNormalUser = true; password = password; }; test1 = { isNormalUser = true; password = password; };

View file

@ -334,7 +334,7 @@ let
virtualisation.memorySize = 2048; virtualisation.memorySize = 2048;
virtualisation.virtualbox.host.enable = true; virtualisation.virtualbox.host.enable = true;
services.xserver.displayManager.auto.user = "alice"; services.xserver.displayManager.auto.user = "alice";
users.extraUsers.alice.extraGroups = let users.users.alice.extraGroups = let
inherit (config.virtualisation.virtualbox.host) enableHardening; inherit (config.virtualisation.virtualbox.host) enableHardening;
in lib.mkIf enableHardening (lib.singleton "vboxusers"); in lib.mkIf enableHardening (lib.singleton "vboxusers");
}; };