summary refs log tree commit diff
path: root/nixos/modules/virtualisation/amazon-image.nix
Commit message (Collapse)AuthorAge
* Obsolete security.initialPasswordEelco Dolstra2014-11-03
| | | | You can now set users.extraUsers.root.initialHashedPassword instead.
* DohhRob Vermaas2014-10-14
| | | | (cherry picked from commit b7451d91e8ecb70651fd2de81b2ec0faa8173aec)
* amazon-image.nix: Pass --option build-users-group '' to nix tools to make ↵Rob Vermaas2014-10-14
| | | | | | Amazon generation work with nix-1.8+ (cherry picked from commit 654eaeb2ca709908b0e6fdcc8eabd3af6b3c0a5d)
* amazon-image.nix: Overwrite busybox swaponShea Levy2014-08-01
|
* Change size of Amazon EC2 S3-backed images to 8GB (was 4GB).Rob Vermaas2014-06-19
| | | | (cherry picked from commit 05543ef6e038a834aa323d467c9ef02ad99c5adb)
* EC2: allow building S3-backed HVM ami'sRob Vermaas2014-06-19
| | | | (cherry picked from commit e007559e9580c134f43ea9dc2279ff41cb3bd015)
* Add option ec2.hvm, to set some boot configuration specific for EC2 HVM ↵Rob Vermaas2014-05-21
| | | | | | | | | instances. (cherry picked from commit 35c76d917307b7ac405486855cfe63021810dba5) Conflicts: nixos/modules/virtualisation/amazon-image.nix
* Set console=ttyS0 for Amazon EC2 instances, as suggested by Amazon.Rob Vermaas2014-05-12
|
* nixos-install: Ask the user to set a root passwordEelco Dolstra2014-05-09
| | | | This removes the need to have an initially empty root password.
* Rewrite ‘with pkgs.lib’ -> ‘with lib’Eelco Dolstra2014-04-14
| | | | | | | | Using pkgs.lib on the spine of module evaluation is problematic because the pkgs argument depends on the result of module evaluation. To prevent an infinite recursion, pkgs and some of the modules are evaluated twice, which is inefficient. Using ‘with lib’ prevents this problem.
* Make initialRootPassword overrideable in all virtualisation modules, not ↵Rickard Nilsson2014-02-24
| | | | just virtualbox.
* Re-introduce security.initialRootPassword, and add a new option ↵Rickard Nilsson2014-02-05
| | | | users.extraUsers.<user>.hashedPassword
* Generate /etc/passwd and /etc/group at build timeRickard Nilsson2014-02-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is a rather large commit that switches user/group creation from using useradd/groupadd on activation to just generating the contents of /etc/passwd and /etc/group, and then on activation merging the generated files with the files that exist in the system. This makes the user activation process much cleaner, in my opinion. The users.extraUsers.<user>.uid and users.extraGroups.<group>.gid must all be properly defined (if <user>.createUser is true, which it is by default). My pull request adds a lot of uids/gids to config.ids to solve this problem for existing nixos services, but there might be configurations that break because this change. However, this will be discovered during the build. Option changes introduced by this commit: * Remove the options <user>.isSystemUser and <user>.isAlias since they don't make sense when generating /etc/passwd statically. * Add <group>.members as a complement to <user>.extraGroups. * Add <user>.passwordFile for setting a user's password from an encrypted (shadow-style) file. * Add users.mutableUsers which is true by default. This means you can keep managing your users as previously, by using useradd/groupadd manually. This is accomplished by merging the generated passwd/group file with the existing files in /etc on system activation. The merging of the files is simplistic. It just looks at the user/group names. If a user/group exists both on the system and in the generated files, the system entry will be kept un-changed and the generated entries will be ignored. The merging itself is performed with the help of vipw/vigr to properly lock the account files during edit. If mutableUsers is set to false, the generated passwd and group files will not be merged with the system files on activation. Instead they will simply replace the system files, and overwrite any changes done on the running system. The same logic holds for user password, if the <user>.password or <user>.passwordFile options are used. If mutableUsers is false, password will simply be replaced on activation. If true, the initial user passwords will be set according to the configuration, but existing passwords will not be touched. I have tested this on a couple of different systems and it seems to work fine so far. If you think this is a good idea, please test it. This way of adding local users has been discussed in issue #103 (and this commit solves that issue).
* Don't set an initial null root password for Amazon / VirtualBox imagesEelco Dolstra2013-11-01
| | | | | | | | | A null password allows logging into local PAM services such as "login" (agetty) and KDM. That's not actually a security problem for EC2 machines, since they do not have "local" logins; for VirtualBox machines, if you local access, you can do anything anyway. But it's better to be on the safe side and disable password-based logins for root.
* Rename environment.nix -> nix.packageEelco Dolstra2013-10-28
|
* Move all of NixOS to nixos/ in preparation of the repository mergeEelco Dolstra2013-10-10