mirror of
https://github.com/fort-nix/nix-bitcoin.git
synced 2024-11-26 16:18:52 +03:00
modules: use user & group options
I've tried my best to locate all uses of hardcoded usernames, but its not guaranteed that all have been found/fixed.
This commit is contained in:
parent
ccef870b74
commit
e873326bfe
@ -385,13 +385,13 @@ in {
|
|||||||
users.groups.bitcoinrpc = {};
|
users.groups.bitcoinrpc = {};
|
||||||
nix-bitcoin.operator.groups = [ cfg.group ];
|
nix-bitcoin.operator.groups = [ cfg.group ];
|
||||||
|
|
||||||
nix-bitcoin.secrets.bitcoin-rpcpassword-privileged.user = "bitcoin";
|
nix-bitcoin.secrets.bitcoin-rpcpassword-privileged.user = cfg.user;
|
||||||
nix-bitcoin.secrets.bitcoin-rpcpassword-public = {
|
nix-bitcoin.secrets.bitcoin-rpcpassword-public = {
|
||||||
user = "bitcoin";
|
user = cfg.user;
|
||||||
group = "bitcoinrpc";
|
group = "bitcoinrpc";
|
||||||
};
|
};
|
||||||
|
|
||||||
nix-bitcoin.secrets.bitcoin-HMAC-privileged.user = "bitcoin";
|
nix-bitcoin.secrets.bitcoin-HMAC-privileged.user = cfg.user;
|
||||||
nix-bitcoin.secrets.bitcoin-HMAC-public.user = "bitcoin";
|
nix-bitcoin.secrets.bitcoin-HMAC-public.user = cfg.user;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -218,7 +218,7 @@ in {
|
|||||||
users.groups.${cfg.nbxplorer.group} = {};
|
users.groups.${cfg.nbxplorer.group} = {};
|
||||||
users.users.${cfg.btcpayserver.user} = {
|
users.users.${cfg.btcpayserver.user} = {
|
||||||
group = cfg.btcpayserver.group;
|
group = cfg.btcpayserver.group;
|
||||||
extraGroups = [ "nbxplorer" ]
|
extraGroups = [ cfg.nbxplorer.group ]
|
||||||
++ optional (cfg.btcpayserver.lightningBackend == "clightning") cfg.clightning.user;
|
++ optional (cfg.btcpayserver.lightningBackend == "clightning") cfg.clightning.user;
|
||||||
home = cfg.btcpayserver.dataDir;
|
home = cfg.btcpayserver.dataDir;
|
||||||
};
|
};
|
||||||
@ -226,10 +226,10 @@ in {
|
|||||||
|
|
||||||
nix-bitcoin.secrets = {
|
nix-bitcoin.secrets = {
|
||||||
bitcoin-rpcpassword-btcpayserver = {
|
bitcoin-rpcpassword-btcpayserver = {
|
||||||
user = "bitcoin";
|
user = cfg.bitcoind.user;
|
||||||
group = "nbxplorer";
|
group = cfg.nbxplorer.group;
|
||||||
};
|
};
|
||||||
bitcoin-HMAC-btcpayserver.user = "bitcoin";
|
bitcoin-HMAC-btcpayserver.user = cfg.bitcoind.user;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -110,7 +110,7 @@ in {
|
|||||||
|
|
||||||
users.users.${cfg.user} = {
|
users.users.${cfg.user} = {
|
||||||
group = cfg.group;
|
group = cfg.group;
|
||||||
extraGroups = [ "bitcoinrpc" ] ++ optionals cfg.high-memory [ "bitcoin" ];
|
extraGroups = [ "bitcoinrpc" ] ++ optionals cfg.high-memory [ bitcoind.user ];
|
||||||
};
|
};
|
||||||
users.groups.${cfg.group} = {};
|
users.groups.${cfg.group} = {};
|
||||||
};
|
};
|
||||||
|
@ -89,7 +89,7 @@ in {
|
|||||||
environment.systemPackages = [ cfg.package (hiPrio cfg.cli) ];
|
environment.systemPackages = [ cfg.package (hiPrio cfg.cli) ];
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"d '${cfg.dataDir}' 0770 lnd lnd - -"
|
"d '${cfg.dataDir}' 0770 ${config.services.lnd.user} ${config.services.lnd.group} - -"
|
||||||
];
|
];
|
||||||
|
|
||||||
systemd.services.lightning-loop = {
|
systemd.services.lightning-loop = {
|
||||||
@ -98,7 +98,7 @@ in {
|
|||||||
after = [ "lnd.service" ];
|
after = [ "lnd.service" ];
|
||||||
serviceConfig = nbLib.defaultHardening // {
|
serviceConfig = nbLib.defaultHardening // {
|
||||||
ExecStart = "${cfg.package}/bin/loopd --configfile=${configFile}";
|
ExecStart = "${cfg.package}/bin/loopd --configfile=${configFile}";
|
||||||
User = "lnd";
|
User = config.services.lnd.user;
|
||||||
Restart = "on-failure";
|
Restart = "on-failure";
|
||||||
RestartSec = "10s";
|
RestartSec = "10s";
|
||||||
ReadWritePaths = cfg.dataDir;
|
ReadWritePaths = cfg.dataDir;
|
||||||
@ -108,8 +108,8 @@ in {
|
|||||||
};
|
};
|
||||||
|
|
||||||
nix-bitcoin.secrets = {
|
nix-bitcoin.secrets = {
|
||||||
loop-key.user = "lnd";
|
loop-key.user = config.services.lnd.user;
|
||||||
loop-cert.user = "lnd";
|
loop-cert.user = config.services.lnd.user;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -252,6 +252,6 @@ in {
|
|||||||
users.groups.${cfg.group} = {};
|
users.groups.${cfg.group} = {};
|
||||||
nix-bitcoin.operator.groups = [ cfg.group ];
|
nix-bitcoin.operator.groups = [ cfg.group ];
|
||||||
|
|
||||||
nix-bitcoin.secrets.liquid-rpcpassword.user = "liquid";
|
nix-bitcoin.secrets.liquid-rpcpassword.user = cfg.user;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@ let
|
|||||||
lnd = config.services.lnd;
|
lnd = config.services.lnd;
|
||||||
|
|
||||||
bin = pkgs.writeScriptBin "lndconnect-rest-onion" ''
|
bin = pkgs.writeScriptBin "lndconnect-rest-onion" ''
|
||||||
#!/usr/bin/env -S ${runAsUser} lnd ${pkgs.bash}/bin/bash
|
#!/usr/bin/env -S ${runAsUser} ${lnd.user} ${pkgs.bash}/bin/bash
|
||||||
|
|
||||||
exec ${cfg.package}/bin/lndconnect \
|
exec ${cfg.package}/bin/lndconnect \
|
||||||
--host=$(cat ${config.nix-bitcoin.onionAddresses.dataDir}/lnd/lnd-rest) \
|
--host=$(cat ${config.nix-bitcoin.onionAddresses.dataDir}/lnd/lnd-rest) \
|
||||||
|
@ -100,7 +100,7 @@ in {
|
|||||||
|
|
||||||
users.users.recurring-donations = {
|
users.users.recurring-donations = {
|
||||||
group = "recurring-donations";
|
group = "recurring-donations";
|
||||||
extraGroups = [ "clightning" ];
|
extraGroups = [ config.services.clightning.group ];
|
||||||
};
|
};
|
||||||
users.groups.recurring-donations = {};
|
users.groups.recurring-donations = {};
|
||||||
};
|
};
|
||||||
|
Loading…
Reference in New Issue
Block a user