typo fixes uid gid
This commit is contained in:
@@ -17,7 +17,7 @@ in
|
|||||||
owner = config.users.users.kavita.name;
|
owner = config.users.users.kavita.name;
|
||||||
inherit (config.users.users.kavita) group;
|
inherit (config.users.users.kavita) group;
|
||||||
};
|
};
|
||||||
users.groups.kavita.gid = { inherit gid; };
|
users.groups.kavita = { inherit gid; };
|
||||||
users.users.kavita = {
|
users.users.kavita = {
|
||||||
inherit uid;
|
inherit uid;
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
|
|||||||
@@ -51,7 +51,7 @@ in
|
|||||||
"nodejs-14.21.3"
|
"nodejs-14.21.3"
|
||||||
"openssl-1.1.1v"
|
"openssl-1.1.1v"
|
||||||
];
|
];
|
||||||
users.groups.nextcloud.gid = { inherit gid; };
|
users.groups.nextcloud = { inherit gid; };
|
||||||
users.users.nextcloud = {
|
users.users.nextcloud = {
|
||||||
inherit uid;
|
inherit uid;
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
|
|||||||
@@ -13,7 +13,7 @@ in
|
|||||||
{
|
{
|
||||||
options.my.servers.oauth2-proxy = setup.mkOptions "oauth2-proxy" "auth-proxy" 4180;
|
options.my.servers.oauth2-proxy = setup.mkOptions "oauth2-proxy" "auth-proxy" 4180;
|
||||||
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
||||||
users.groups.oauth2-proxy.gid = { inherit gid; };
|
users.groups.oauth2-proxy = { inherit gid; };
|
||||||
users.users.oauth2-proxy = {
|
users.users.oauth2-proxy = {
|
||||||
inherit uid;
|
inherit uid;
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ in
|
|||||||
options.my.servers.paperless.enable = lib.mkEnableOption "Paperless-ngx document management system";
|
options.my.servers.paperless.enable = lib.mkEnableOption "Paperless-ngx document management system";
|
||||||
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable) {
|
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable) {
|
||||||
networking.firewall.allowedTCPPorts = [ port ];
|
networking.firewall.allowedTCPPorts = [ port ];
|
||||||
users.groups.paperless.gid = { inherit gid; };
|
users.groups.paperless = { inherit gid; };
|
||||||
users.users.paperless = {
|
users.users.paperless = {
|
||||||
inherit uid;
|
inherit uid;
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
|
|||||||
@@ -15,41 +15,43 @@ in
|
|||||||
group = "piracy";
|
group = "piracy";
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
};
|
};
|
||||||
services.plex = {
|
services = {
|
||||||
inherit (cfg) enable;
|
plex = {
|
||||||
group = "piracy";
|
inherit (cfg) enable;
|
||||||
};
|
group = "piracy";
|
||||||
nginx = lib.mkIf cfg.enableProxy {
|
};
|
||||||
virtualHosts."${cfg.host}" = {
|
nginx = lib.mkIf cfg.enableProxy {
|
||||||
forceSSL = true;
|
virtualHosts."${cfg.host}" = {
|
||||||
enableACME = true;
|
forceSSL = true;
|
||||||
http2 = true;
|
enableACME = true;
|
||||||
serverAliases = [
|
http2 = true;
|
||||||
"plex.rotehaare.art"
|
serverAliases = [
|
||||||
];
|
"plex.rotehaare.art"
|
||||||
extraConfig = ''
|
];
|
||||||
# Some players don't reopen a socket and playback stops totally instead of resuming after an extended pause
|
extraConfig = ''
|
||||||
send_timeout 100m;
|
# Some players don't reopen a socket and playback stops totally instead of resuming after an extended pause
|
||||||
# Plex headers
|
send_timeout 100m;
|
||||||
proxy_set_header X-Plex-Client-Identifier $http_x_plex_client_identifier;
|
# Plex headers
|
||||||
proxy_set_header X-Plex-Device $http_x_plex_device;
|
proxy_set_header X-Plex-Client-Identifier $http_x_plex_client_identifier;
|
||||||
proxy_set_header X-Plex-Device-Name $http_x_plex_device_name;
|
proxy_set_header X-Plex-Device $http_x_plex_device;
|
||||||
proxy_set_header X-Plex-Platform $http_x_plex_platform;
|
proxy_set_header X-Plex-Device-Name $http_x_plex_device_name;
|
||||||
proxy_set_header X-Plex-Platform-Version $http_x_plex_platform_version;
|
proxy_set_header X-Plex-Platform $http_x_plex_platform;
|
||||||
proxy_set_header X-Plex-Product $http_x_plex_product;
|
proxy_set_header X-Plex-Platform-Version $http_x_plex_platform_version;
|
||||||
proxy_set_header X-Plex-Token $http_x_plex_token;
|
proxy_set_header X-Plex-Product $http_x_plex_product;
|
||||||
proxy_set_header X-Plex-Version $http_x_plex_version;
|
proxy_set_header X-Plex-Token $http_x_plex_token;
|
||||||
proxy_set_header X-Plex-Nocache $http_x_plex_nocache;
|
proxy_set_header X-Plex-Version $http_x_plex_version;
|
||||||
proxy_set_header X-Plex-Provides $http_x_plex_provides;
|
proxy_set_header X-Plex-Nocache $http_x_plex_nocache;
|
||||||
proxy_set_header X-Plex-Device-Vendor $http_x_plex_device_vendor;
|
proxy_set_header X-Plex-Provides $http_x_plex_provides;
|
||||||
proxy_set_header X-Plex-Model $http_x_plex_model;
|
proxy_set_header X-Plex-Device-Vendor $http_x_plex_device_vendor;
|
||||||
# Buffering off send to the client as soon as the data is received from Plex.
|
proxy_set_header X-Plex-Model $http_x_plex_model;
|
||||||
proxy_redirect off;
|
# Buffering off send to the client as soon as the data is received from Plex.
|
||||||
proxy_buffering off;
|
proxy_redirect off;
|
||||||
'';
|
proxy_buffering off;
|
||||||
locations."/" = {
|
'';
|
||||||
proxyPass = cfg.local;
|
locations."/" = {
|
||||||
proxyWebsockets = true;
|
proxyPass = cfg.local;
|
||||||
|
proxyWebsockets = true;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -30,7 +30,7 @@ in
|
|||||||
synapse = { inherit domain; };
|
synapse = { inherit domain; };
|
||||||
element = { inherit domain; };
|
element = { inherit domain; };
|
||||||
};
|
};
|
||||||
users.groups.matrix-synapse.gid = { inherit gid; };
|
users.groups.matrix-synapse = { inherit gid; };
|
||||||
users.users.matrix-synapse = {
|
users.users.matrix-synapse = {
|
||||||
inherit uid;
|
inherit uid;
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
|
|||||||
@@ -15,7 +15,7 @@ in
|
|||||||
options.my.servers.vaultwarden = setup.mkOptions "vaultwarden" "vault" 8222;
|
options.my.servers.vaultwarden = setup.mkOptions "vaultwarden" "vault" 8222;
|
||||||
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) {
|
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) {
|
||||||
sops.secrets.vaultwarden.sopsFile = ../../secrets/env.yaml;
|
sops.secrets.vaultwarden.sopsFile = ../../secrets/env.yaml;
|
||||||
users.groups.vaultwarden.gid = { inherit gid; };
|
users.groups.vaultwarden = { inherit gid; };
|
||||||
users.users.vaultwarden = {
|
users.users.vaultwarden = {
|
||||||
inherit uid;
|
inherit uid;
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
|
|||||||
@@ -31,9 +31,9 @@
|
|||||||
users = {
|
users = {
|
||||||
groups.nixremote.gid = config.my.users.nixremote.gid;
|
groups.nixremote.gid = config.my.users.nixremote.gid;
|
||||||
users.nixremote = {
|
users.nixremote = {
|
||||||
uid = 979;
|
|
||||||
inherit (config.my.users.nixremote) home;
|
inherit (config.my.users.nixremote) home;
|
||||||
isNormalUser = true;
|
uid = 979;
|
||||||
|
isSystemUser = true;
|
||||||
createHome = true;
|
createHome = true;
|
||||||
group = "nixremote";
|
group = "nixremote";
|
||||||
openssh.authorizedKeys.keyFiles = config.my.users.nixremote.authorizedKeys;
|
openssh.authorizedKeys.keyFiles = config.my.users.nixremote.authorizedKeys;
|
||||||
|
|||||||
Reference in New Issue
Block a user