Skip to content
This repository has been archived by the owner on Mar 20, 2023. It is now read-only.

Commit

Permalink
fix: create steward and benefice users/groups
Browse files Browse the repository at this point in the history
Ideally, this should not be necessary, but it's required due to #109

Signed-off-by: Roman Volosatovs <[email protected]>
  • Loading branch information
rvolosatovs committed Aug 9, 2022
1 parent f3f1722 commit 9899c35
Show file tree
Hide file tree
Showing 2 changed files with 14 additions and 0 deletions.
7 changes: 7 additions & 0 deletions nixosConfigurations/services/benefice.nix
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,13 @@ with flake-utils.lib.system; let
sops.secrets.oidc-secret.sopsFile = "${self}/hosts/${config.networking.fqdn}/oidc-secret";

systemd.services.benefice = self.lib.systemd.withSecret config pkgs "benefice" "oidc-secret";

# Workaround for https://github.com/profianinc/infrastructure/issues/109

users.groups.benefice = {};

users.users.benefice.isSystemUser = true;
users.users.benefice.group = config.users.groups.benefice.name;
})
];

Expand Down
7 changes: 7 additions & 0 deletions nixosConfigurations/services/steward.nix
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,13 @@ with flake-utils.lib.system; let
sops.secrets.key.sopsFile = "${self}/hosts/${config.networking.fqdn}/steward.key";

systemd.services.steward = self.lib.systemd.withSecret config pkgs "steward" "key";

# Workaround for https://github.com/profianinc/infrastructure/issues/109

users.groups.steward = {};

users.users.steward.isSystemUser = true;
users.users.steward.group = config.users.groups.steward.name;
})
];

Expand Down

0 comments on commit 9899c35

Please sign in to comment.