diff --git a/nixos/modules/config/users-groups.nix b/nixos/modules/config/users-groups.nix
index 776c482bf7f..adc014eed41 100644
--- a/nixos/modules/config/users-groups.nix
+++ b/nixos/modules/config/users-groups.nix
@@ -336,13 +336,13 @@ let
map (range: "${user.name}:${toString range.startUid}:${toString range.count}\n")
user.subUidRanges);
- subuidFile = concatStrings (map mkSubuidEntry (attrValues cfg.extraUsers));
+ subuidFile = concatStrings (map mkSubuidEntry (attrValues cfg.users));
mkSubgidEntry = user: concatStrings (
map (range: "${user.name}:${toString range.startGid}:${toString range.count}\n")
user.subGidRanges);
- subgidFile = concatStrings (map mkSubgidEntry (attrValues cfg.extraUsers));
+ subgidFile = concatStrings (map mkSubgidEntry (attrValues cfg.users));
idsAreUnique = set: idAttr: !(fold (name: args@{ dup, acc }:
let
@@ -354,8 +354,8 @@ let
else { dup = false; acc = newAcc; }
) { dup = false; acc = {}; } (builtins.attrNames set)).dup;
- uidsAreUnique = idsAreUnique (filterAttrs (n: u: u.uid != null) cfg.extraUsers) "uid";
- gidsAreUnique = idsAreUnique (filterAttrs (n: g: g.gid != null) cfg.extraGroups) "gid";
+ uidsAreUnique = idsAreUnique (filterAttrs (n: u: u.uid != null) cfg.users) "uid";
+ gidsAreUnique = idsAreUnique (filterAttrs (n: g: g.gid != null) cfg.groups) "gid";
spec = pkgs.writeText "users-groups.json" (builtins.toJSON {
inherit (cfg) mutableUsers;
@@ -364,13 +364,13 @@ let
name uid group description home shell createHome isSystemUser
password passwordFile hashedPassword
initialPassword initialHashedPassword;
- }) cfg.extraUsers;
+ }) cfg.users;
groups = mapAttrsToList (n: g:
{ inherit (g) name gid;
members = g.members ++ (mapAttrsToList (n: u: u.name) (
- filterAttrs (n: u: elem g.name u.extraGroups) cfg.extraUsers
+ filterAttrs (n: u: elem g.name u.extraGroups) cfg.users
));
- }) cfg.extraGroups;
+ }) cfg.groups;
});
in {
@@ -388,10 +388,10 @@ in {
groupadd commands. On system activation, the
existing contents of the /etc/passwd and
/etc/group files will be merged with the
- contents generated from the users.extraUsers and
- users.extraGroups options.
+ contents generated from the users.users and
+ users.groups options.
The initial password for a user will be set
- according to users.extraUsers, but existing passwords
+ according to users.users, but existing passwords
will not be changed.
@@ -399,7 +399,7 @@ in {
group files will simply be replaced on system activation. This also
holds for the user passwords; all changed
passwords will be reset according to the
- users.extraUsers configuration on activation.
+ users.users configuration on activation.
'';
};
@@ -412,7 +412,7 @@ in {
'';
};
- users.extraUsers = mkOption {
+ users.users = mkOption {
default = {};
type = types.loaOf types.optionSet;
example = {
@@ -433,7 +433,7 @@ in {
options = [ userOpts ];
};
- users.extraGroups = mkOption {
+ users.groups = mkOption {
default = {};
example =
{ students.gid = 1001;
@@ -461,7 +461,7 @@ in {
config = {
- users.extraUsers = {
+ users.users = {
root = {
uid = ids.uids.root;
description = "System administrator";
@@ -478,7 +478,7 @@ in {
};
};
- users.extraGroups = {
+ users.groups = {
root.gid = ids.gids.root;
wheel.gid = ids.gids.wheel;
disk.gid = ids.gids.disk;
@@ -541,7 +541,7 @@ in {
|| cfg.passwordFile != null
|| cfg.openssh.authorizedKeys.keys != []
|| cfg.openssh.authorizedKeys.keyFiles != [])
- ) cfg.extraUsers);
+ ) cfg.users);
message = ''
Neither the root account nor any wheel user has a password or SSH authorized key.
You must set one to prevent being locked out of your system.'';
diff --git a/nixos/modules/rename.nix b/nixos/modules/rename.nix
index 6f7dcb837a0..cb378b02449 100644
--- a/nixos/modules/rename.nix
+++ b/nixos/modules/rename.nix
@@ -77,6 +77,8 @@ in zipModules ([]
++ obsolete [ "environment" "nix" ] [ "nix" "package" ]
++ obsolete [ "fonts" "enableFontConfig" ] [ "fonts" "fontconfig" "enable" ]
++ obsolete [ "fonts" "extraFonts" ] [ "fonts" "fonts" ]
+++ alias [ "users" "extraUsers" ] [ "users" "users" ]
+++ alias [ "users" "extraGroups" ] [ "users" "groups" ]
++ obsolete [ "security" "extraSetuidPrograms" ] [ "security" "setuidPrograms" ]
++ obsolete [ "networking" "enableWLAN" ] [ "networking" "wireless" "enable" ]
diff --git a/nixos/modules/services/networking/ssh/sshd.nix b/nixos/modules/services/networking/ssh/sshd.nix
index 4c7e4d8d088..5baea4bc6ae 100644
--- a/nixos/modules/services/networking/ssh/sshd.nix
+++ b/nixos/modules/services/networking/ssh/sshd.nix
@@ -214,7 +214,7 @@ in
};
- users.extraUsers = mkOption {
+ users.users = mkOption {
options = [ userOptions ];
};