typo fixes uid gid
This commit is contained in:
@@ -17,7 +17,7 @@ in
|
||||
owner = config.users.users.kavita.name;
|
||||
inherit (config.users.users.kavita) group;
|
||||
};
|
||||
users.groups.kavita.gid = { inherit gid; };
|
||||
users.groups.kavita = { inherit gid; };
|
||||
users.users.kavita = {
|
||||
inherit uid;
|
||||
isSystemUser = true;
|
||||
|
||||
@@ -51,7 +51,7 @@ in
|
||||
"nodejs-14.21.3"
|
||||
"openssl-1.1.1v"
|
||||
];
|
||||
users.groups.nextcloud.gid = { inherit gid; };
|
||||
users.groups.nextcloud = { inherit gid; };
|
||||
users.users.nextcloud = {
|
||||
inherit uid;
|
||||
isSystemUser = true;
|
||||
|
||||
@@ -13,7 +13,7 @@ in
|
||||
{
|
||||
options.my.servers.oauth2-proxy = setup.mkOptions "oauth2-proxy" "auth-proxy" 4180;
|
||||
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
||||
users.groups.oauth2-proxy.gid = { inherit gid; };
|
||||
users.groups.oauth2-proxy = { inherit gid; };
|
||||
users.users.oauth2-proxy = {
|
||||
inherit uid;
|
||||
isSystemUser = true;
|
||||
|
||||
@@ -10,7 +10,7 @@ in
|
||||
options.my.servers.paperless.enable = lib.mkEnableOption "Paperless-ngx document management system";
|
||||
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable) {
|
||||
networking.firewall.allowedTCPPorts = [ port ];
|
||||
users.groups.paperless.gid = { inherit gid; };
|
||||
users.groups.paperless = { inherit gid; };
|
||||
users.users.paperless = {
|
||||
inherit uid;
|
||||
isSystemUser = true;
|
||||
|
||||
@@ -15,7 +15,8 @@ in
|
||||
group = "piracy";
|
||||
isSystemUser = true;
|
||||
};
|
||||
services.plex = {
|
||||
services = {
|
||||
plex = {
|
||||
inherit (cfg) enable;
|
||||
group = "piracy";
|
||||
};
|
||||
@@ -54,4 +55,5 @@ in
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
@@ -30,7 +30,7 @@ in
|
||||
synapse = { inherit domain; };
|
||||
element = { inherit domain; };
|
||||
};
|
||||
users.groups.matrix-synapse.gid = { inherit gid; };
|
||||
users.groups.matrix-synapse = { inherit gid; };
|
||||
users.users.matrix-synapse = {
|
||||
inherit uid;
|
||||
isSystemUser = true;
|
||||
|
||||
@@ -15,7 +15,7 @@ in
|
||||
options.my.servers.vaultwarden = setup.mkOptions "vaultwarden" "vault" 8222;
|
||||
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) {
|
||||
sops.secrets.vaultwarden.sopsFile = ../../secrets/env.yaml;
|
||||
users.groups.vaultwarden.gid = { inherit gid; };
|
||||
users.groups.vaultwarden = { inherit gid; };
|
||||
users.users.vaultwarden = {
|
||||
inherit uid;
|
||||
isSystemUser = true;
|
||||
|
||||
@@ -31,9 +31,9 @@
|
||||
users = {
|
||||
groups.nixremote.gid = config.my.users.nixremote.gid;
|
||||
users.nixremote = {
|
||||
uid = 979;
|
||||
inherit (config.my.users.nixremote) home;
|
||||
isNormalUser = true;
|
||||
uid = 979;
|
||||
isSystemUser = true;
|
||||
createHome = true;
|
||||
group = "nixremote";
|
||||
openssh.authorizedKeys.keyFiles = config.my.users.nixremote.authorizedKeys;
|
||||
|
||||
Reference in New Issue
Block a user