Add tmpfile rule

This commit is contained in:
soraefir
2026-05-05 00:27:24 +02:00
parent cd05d939a8
commit b2d040d414
2 changed files with 72 additions and 69 deletions

View File

@@ -8,7 +8,7 @@ let
inherit (containerCfg) port special_param; inherit (containerCfg) port special_param;
} }
) enabledConfigs; ) enabledConfigs;
mergedContainers = lib.attrsets.mergeAttrsList containerSetsList; mergedContainers = lib.attrsets.mergeAttrsList (lib.map(e: e.containers) containerSetsList);
in in
{ {
config = lib.mkIf ( enabledConfigs != {} ) { config = lib.mkIf ( enabledConfigs != {} ) {

View File

@@ -1,6 +1,11 @@
{ config, pkgs, lib, ... }: { config, pkgs, lib, ... }:
let serverCfg = config.syscfg.server; let serverCfg = config.syscfg.server;
in { in {
systemd.tmfiles.rules = [
"d ${serverCfg.dataPath}/authentik/media 0755 root root -"
"d ${serverCfg.dataPath}/authentik/template 0755 root root -"
];
containers = {
auth_postgresql = { auth_postgresql = {
image = "postgres:14-alpine"; image = "postgres:14-alpine";
hostname = "auth_postgresql"; hostname = "auth_postgresql";
@@ -10,7 +15,6 @@ in {
POSTGRES_USER = "authentik"; POSTGRES_USER = "authentik";
POSTGRES_DB = "authentik"; POSTGRES_DB = "authentik";
}; };
labels = { "traefik.enable" = "false"; };
}; };
auth_redis = { auth_redis = {
@@ -18,7 +22,6 @@ in {
hostname = "auth_redis"; hostname = "auth_redis";
volumes = [ ]; volumes = [ ];
environment = { }; environment = { };
labels = { "traefik.enable" = "false"; };
}; };
auth_server = { auth_server = {
@@ -73,7 +76,7 @@ in {
"AUTHENTIK_POSTGRESQL__PASSWORD" = "AUTHENTIK_DB_PASSWORD"; "AUTHENTIK_POSTGRESQL__PASSWORD" = "AUTHENTIK_DB_PASSWORD";
"AUTHENTIK_SECRET_KEY" = "AUTHENTIK_SECRET_KEY"; "AUTHENTIK_SECRET_KEY" = "AUTHENTIK_SECRET_KEY";
}; };
labels = { "traefik.enable" = "false"; };
cmd = [ "worker" ]; cmd = [ "worker" ];
}; };
};
} }