summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorQuentin Aristote <quentin@aristote.fr>2021-11-26 14:46:07 +0100
committerQuentin Aristote <quentin@aristote.fr>2021-11-26 14:46:07 +0100
commit0b6558fbd828800621cd9e8918fb91f2602111ba (patch)
treeee5cc16887d8220f7c7464158a8c57dc1a0ef7b1
parent8a39776f04482caf14a77bee9ce07aad4304c6ab (diff)
write configuration for running in a local container
-rw-r--r--test/vm.nix52
1 files changed, 48 insertions, 4 deletions
diff --git a/test/vm.nix b/test/vm.nix
index a47e3b8..ca4791a 100644
--- a/test/vm.nix
+++ b/test/vm.nix
@@ -1,6 +1,50 @@
-{ lib, ... }:
-{
- imports = [ ../configuration.nix ];
+{ config, lib, ... }:
- networking.domain = lib.mkForce "latitude7490";
+let
+ nginxPorts = lib.concatLists
+ (lib.mapAttrsToList (_: cfg: (builtins.map (x: x.port) cfg.listen))
+ config.services.nginx.virtualHosts);
+in {
+ imports = [ ../configuration.nix ];
+
+ networking = lib.mkForce {
+ domain = "aristote.vm";
+
+ interfaces = { };
+ defaultGateway = null;
+ nameservers = [ ];
+
+ firewall = { allowedTCPPorts = nginxPorts; };
+ };
+
+ services.nginx.virtualHosts = {
+ "quentin.${config.networking.domain}" = {
+ listen = lib.mkForce [{
+ addr = "0.0.0.0";
+ port = 8080;
+ }];
+ forceSSL = lib.mkForce false;
+ enableACME = lib.mkForce false;
+ };
+ "searx.${config.networking.domain}" = {
+ listen = lib.mkForce [{
+ addr = "0.0.0.0";
+ port = 8081;
+ }];
+ forceSSL = lib.mkForce false;
+ enableACME = lib.mkForce false;
+ };
+ "money.${config.networking.domain}" = {
+ listen = lib.mkForce [{
+ addr = "0.0.0.0";
+ port = 8082;
+ }];
+ forceSSL = lib.mkForce false;
+ enableACME = lib.mkForce false;
+ };
+ };
+
+ environment.etc."searx/secrets".text = ''
+ SECRET_KEY=secret_key
+ '';
}