diff options
author | Gregor Kleen <gkleen@yggdrasil.li> | 2018-06-02 20:33:49 +0200 |
---|---|---|
committer | Gregor Kleen <gkleen@yggdrasil.li> | 2018-06-02 20:33:49 +0200 |
commit | 347da4ffbb4b870b330a22d7f5e0eda432a512f0 (patch) | |
tree | 9fa6c051d998e464d95e21f2e4d7c22b7bffc66d | |
parent | 937905d28c904205b1647095fa50827db91c249d (diff) | |
download | nixos-347da4ffbb4b870b330a22d7f5e0eda432a512f0.tar nixos-347da4ffbb4b870b330a22d7f5e0eda432a512f0.tar.gz nixos-347da4ffbb4b870b330a22d7f5e0eda432a512f0.tar.bz2 nixos-347da4ffbb4b870b330a22d7f5e0eda432a512f0.tar.xz nixos-347da4ffbb4b870b330a22d7f5e0eda432a512f0.zip |
remove media user
-rw-r--r-- | hel.nix | 40 |
1 files changed, 0 insertions, 40 deletions
@@ -142,17 +142,6 @@ | |||
142 | 142 | ||
143 | openssh = { | 143 | openssh = { |
144 | enable = true; | 144 | enable = true; |
145 | extraConfig = '' | ||
146 | Match User media | ||
147 | ForceCommand internal-sftp | ||
148 | PermitTTY no | ||
149 | AllowTcpForwarding no | ||
150 | AllowStreamLocalForwarding no | ||
151 | X11Forwarding no | ||
152 | AllowAgentForwarding no | ||
153 | ChrootDirectory /run/%u | ||
154 | AuthorizedKeysFile /etc/ssh/authorized_keys.d/%u | ||
155 | ''; | ||
156 | }; | 145 | }; |
157 | 146 | ||
158 | atd = { | 147 | atd = { |
@@ -334,16 +323,6 @@ | |||
334 | 323 | ||
335 | extraUsers.gkleen.extraGroups = [ "media" "networkmanager" "docker" ]; | 324 | extraUsers.gkleen.extraGroups = [ "media" "networkmanager" "docker" ]; |
336 | 325 | ||
337 | extraUsers.media = { | ||
338 | group = "media"; | ||
339 | home = "/var/media"; | ||
340 | isSystemUser = true; | ||
341 | openssh.authorizedKeys.keyFiles = [ | ||
342 | ./users/keys/gkleen-media-hel.pub | ||
343 | ]; | ||
344 | useDefaultShell = true; | ||
345 | }; | ||
346 | |||
347 | extraUsers.postfix_ssh = { | 326 | extraUsers.postfix_ssh = { |
348 | isSystemUser = true; | 327 | isSystemUser = true; |
349 | home = "/var/db/postfix_ssh"; | 328 | home = "/var/db/postfix_ssh"; |
@@ -351,9 +330,6 @@ | |||
351 | 330 | ||
352 | extraGroups = { | 331 | extraGroups = { |
353 | network = {}; | 332 | network = {}; |
354 | media = { | ||
355 | members = [ "uucp" "media" ]; | ||
356 | }; | ||
357 | }; | 333 | }; |
358 | }; | 334 | }; |
359 | 335 | ||
@@ -460,13 +436,6 @@ | |||
460 | }; | 436 | }; |
461 | 437 | ||
462 | systemd.automounts = [ | 438 | systemd.automounts = [ |
463 | { | ||
464 | where = "/run/media/var/media"; | ||
465 | automountConfig = { | ||
466 | DirectoryMode = "700"; | ||
467 | }; | ||
468 | wantedBy = [ "local-fs.target" ]; | ||
469 | } | ||
470 | { | 439 | { |
471 | where = "/media"; | 440 | where = "/media"; |
472 | automountConfig = { | 441 | automountConfig = { |
@@ -478,15 +447,6 @@ | |||
478 | ]; | 447 | ]; |
479 | 448 | ||
480 | systemd.mounts = [ | 449 | systemd.mounts = [ |
481 | { enable = true; | ||
482 | where = "/run/media/var/media"; | ||
483 | what = "/var/media"; | ||
484 | type = "none"; | ||
485 | options = "bind"; | ||
486 | mountConfig = { | ||
487 | DirectoryMode = "700"; | ||
488 | }; | ||
489 | } | ||
490 | { | 450 | { |
491 | after = [ "network-online.target" ]; | 451 | after = [ "network-online.target" ]; |
492 | bindsTo = [ "network-online.target" ]; | 452 | bindsTo = [ "network-online.target" ]; |