fix: create lldap user and group to ensure that it can access secrets
parent
f307e79d38
commit
5763692afd
|
@ -124,6 +124,13 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# lldap LDAP authentication server
|
||||||
|
users.users.lldap = {
|
||||||
|
# allocates the `uid` in the range 100-999, which indicates to software like login managers that it should not be displayed to the user.
|
||||||
|
isSystemUser = true;
|
||||||
|
group = "lldap";
|
||||||
|
};
|
||||||
|
users.groups.lldap = {};
|
||||||
services.lldap = {
|
services.lldap = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
|
@ -194,6 +201,8 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.tailscale.enable = true;
|
||||||
|
|
||||||
# Enable automatic upgrades
|
# Enable automatic upgrades
|
||||||
system.autoUpgrade.enable = true;
|
system.autoUpgrade.enable = true;
|
||||||
system.autoUpgrade.allowReboot = true;
|
system.autoUpgrade.allowReboot = true;
|
||||||
|
|
Loading…
Reference in New Issue