typo fixes uid gid

This commit is contained in:
Danilo Reyes
2026-01-17 16:57:18 -06:00
parent 20c8d082eb
commit 253123c09b
8 changed files with 45 additions and 43 deletions

View File

@@ -17,7 +17,7 @@ in
owner = config.users.users.kavita.name; owner = config.users.users.kavita.name;
inherit (config.users.users.kavita) group; inherit (config.users.users.kavita) group;
}; };
users.groups.kavita.gid = { inherit gid; }; users.groups.kavita = { inherit gid; };
users.users.kavita = { users.users.kavita = {
inherit uid; inherit uid;
isSystemUser = true; isSystemUser = true;

View File

@@ -51,7 +51,7 @@ in
"nodejs-14.21.3" "nodejs-14.21.3"
"openssl-1.1.1v" "openssl-1.1.1v"
]; ];
users.groups.nextcloud.gid = { inherit gid; }; users.groups.nextcloud = { inherit gid; };
users.users.nextcloud = { users.users.nextcloud = {
inherit uid; inherit uid;
isSystemUser = true; isSystemUser = true;

View File

@@ -13,7 +13,7 @@ in
{ {
options.my.servers.oauth2-proxy = setup.mkOptions "oauth2-proxy" "auth-proxy" 4180; options.my.servers.oauth2-proxy = setup.mkOptions "oauth2-proxy" "auth-proxy" 4180;
config = lib.mkIf (cfg.enable && config.my.secureHost) { config = lib.mkIf (cfg.enable && config.my.secureHost) {
users.groups.oauth2-proxy.gid = { inherit gid; }; users.groups.oauth2-proxy = { inherit gid; };
users.users.oauth2-proxy = { users.users.oauth2-proxy = {
inherit uid; inherit uid;
isSystemUser = true; isSystemUser = true;

View File

@@ -10,7 +10,7 @@ in
options.my.servers.paperless.enable = lib.mkEnableOption "Paperless-ngx document management system"; options.my.servers.paperless.enable = lib.mkEnableOption "Paperless-ngx document management system";
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable) { config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable) {
networking.firewall.allowedTCPPorts = [ port ]; networking.firewall.allowedTCPPorts = [ port ];
users.groups.paperless.gid = { inherit gid; }; users.groups.paperless = { inherit gid; };
users.users.paperless = { users.users.paperless = {
inherit uid; inherit uid;
isSystemUser = true; isSystemUser = true;

View File

@@ -15,41 +15,43 @@ in
group = "piracy"; group = "piracy";
isSystemUser = true; isSystemUser = true;
}; };
services.plex = { services = {
inherit (cfg) enable; plex = {
group = "piracy"; inherit (cfg) enable;
}; group = "piracy";
nginx = lib.mkIf cfg.enableProxy { };
virtualHosts."${cfg.host}" = { nginx = lib.mkIf cfg.enableProxy {
forceSSL = true; virtualHosts."${cfg.host}" = {
enableACME = true; forceSSL = true;
http2 = true; enableACME = true;
serverAliases = [ http2 = true;
"plex.rotehaare.art" serverAliases = [
]; "plex.rotehaare.art"
extraConfig = '' ];
# Some players don't reopen a socket and playback stops totally instead of resuming after an extended pause extraConfig = ''
send_timeout 100m; # Some players don't reopen a socket and playback stops totally instead of resuming after an extended pause
# Plex headers send_timeout 100m;
proxy_set_header X-Plex-Client-Identifier $http_x_plex_client_identifier; # Plex headers
proxy_set_header X-Plex-Device $http_x_plex_device; proxy_set_header X-Plex-Client-Identifier $http_x_plex_client_identifier;
proxy_set_header X-Plex-Device-Name $http_x_plex_device_name; proxy_set_header X-Plex-Device $http_x_plex_device;
proxy_set_header X-Plex-Platform $http_x_plex_platform; proxy_set_header X-Plex-Device-Name $http_x_plex_device_name;
proxy_set_header X-Plex-Platform-Version $http_x_plex_platform_version; proxy_set_header X-Plex-Platform $http_x_plex_platform;
proxy_set_header X-Plex-Product $http_x_plex_product; proxy_set_header X-Plex-Platform-Version $http_x_plex_platform_version;
proxy_set_header X-Plex-Token $http_x_plex_token; proxy_set_header X-Plex-Product $http_x_plex_product;
proxy_set_header X-Plex-Version $http_x_plex_version; proxy_set_header X-Plex-Token $http_x_plex_token;
proxy_set_header X-Plex-Nocache $http_x_plex_nocache; proxy_set_header X-Plex-Version $http_x_plex_version;
proxy_set_header X-Plex-Provides $http_x_plex_provides; proxy_set_header X-Plex-Nocache $http_x_plex_nocache;
proxy_set_header X-Plex-Device-Vendor $http_x_plex_device_vendor; proxy_set_header X-Plex-Provides $http_x_plex_provides;
proxy_set_header X-Plex-Model $http_x_plex_model; proxy_set_header X-Plex-Device-Vendor $http_x_plex_device_vendor;
# Buffering off send to the client as soon as the data is received from Plex. proxy_set_header X-Plex-Model $http_x_plex_model;
proxy_redirect off; # Buffering off send to the client as soon as the data is received from Plex.
proxy_buffering off; proxy_redirect off;
''; proxy_buffering off;
locations."/" = { '';
proxyPass = cfg.local; locations."/" = {
proxyWebsockets = true; proxyPass = cfg.local;
proxyWebsockets = true;
};
}; };
}; };
}; };

View File

@@ -30,7 +30,7 @@ in
synapse = { inherit domain; }; synapse = { inherit domain; };
element = { inherit domain; }; element = { inherit domain; };
}; };
users.groups.matrix-synapse.gid = { inherit gid; }; users.groups.matrix-synapse = { inherit gid; };
users.users.matrix-synapse = { users.users.matrix-synapse = {
inherit uid; inherit uid;
isSystemUser = true; isSystemUser = true;

View File

@@ -15,7 +15,7 @@ in
options.my.servers.vaultwarden = setup.mkOptions "vaultwarden" "vault" 8222; options.my.servers.vaultwarden = setup.mkOptions "vaultwarden" "vault" 8222;
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) { config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) {
sops.secrets.vaultwarden.sopsFile = ../../secrets/env.yaml; sops.secrets.vaultwarden.sopsFile = ../../secrets/env.yaml;
users.groups.vaultwarden.gid = { inherit gid; }; users.groups.vaultwarden = { inherit gid; };
users.users.vaultwarden = { users.users.vaultwarden = {
inherit uid; inherit uid;
isSystemUser = true; isSystemUser = true;

View File

@@ -31,9 +31,9 @@
users = { users = {
groups.nixremote.gid = config.my.users.nixremote.gid; groups.nixremote.gid = config.my.users.nixremote.gid;
users.nixremote = { users.nixremote = {
uid = 979;
inherit (config.my.users.nixremote) home; inherit (config.my.users.nixremote) home;
isNormalUser = true; uid = 979;
isSystemUser = true;
createHome = true; createHome = true;
group = "nixremote"; group = "nixremote";
openssh.authorizedKeys.keyFiles = config.my.users.nixremote.authorizedKeys; openssh.authorizedKeys.keyFiles = config.my.users.nixremote.authorizedKeys;