Prevent containers from running non-container services
All checks were successful
Check Flake / check-flake (push) Successful in 2m21s
Auto Update Flake / auto-update (push) Successful in 3m29s

This commit is contained in:
2026-02-22 18:18:05 -08:00
parent 4cf50b5fb1
commit 684851d641
3 changed files with 3 additions and 3 deletions

View File

@@ -102,5 +102,5 @@
security.acme.defaults.email = "zuckerberg@neet.dev"; security.acme.defaults.email = "zuckerberg@neet.dev";
# Enable Desktop Environment if this is a PC (machine role is "personal") # Enable Desktop Environment if this is a PC (machine role is "personal")
de.enable = lib.mkDefault (config.thisMachine.hasRole."personal"); de.enable = lib.mkDefault (config.thisMachine.hasRole."personal" && !config.boot.isContainer);
} }

View File

@@ -12,7 +12,7 @@ let
in in
lib.mkMerge [ lib.mkMerge [
# configure builder # configure builder
(lib.mkIf thisMachineIsABuilder { (lib.mkIf (thisMachineIsABuilder && !config.boot.isContainer) {
users.users.${builderUserName} = { users.users.${builderUserName} = {
description = "Distributed Nix Build User"; description = "Distributed Nix Build User";
group = builderUserName; group = builderUserName;

View File

@@ -1,7 +1,7 @@
{ config, lib, ... }: { config, lib, ... }:
{ {
config = lib.mkIf (config.thisMachine.hasRole."binary-cache") { config = lib.mkIf (config.thisMachine.hasRole."binary-cache" && !config.boot.isContainer) {
services.atticd = { services.atticd = {
enable = true; enable = true;
environmentFile = config.age.secrets.atticd-credentials.path; environmentFile = config.age.secrets.atticd-credentials.path;