NixToSee/tests/glitchtip-container.nix
2025-03-27 19:11:24 +01:00

69 lines
1.9 KiB
Nix

{ nixos-unstable, inputs, ... }:
{
networking.nat = {
enable = true;
internalInterfaces = [ "ve-+" ];
externalInterface = "ens3";
# Lazy IPv6 connectivity for the container
enableIPv6 = true;
};
containers.glitchtip =
{
autoStart = true;
privateNetwork = true;
hostAddress = "192.168.100.10";
localAddress = "192.168.100.11";
hostAddress6 = "fc00::1";
localAddress6 = "fc00::2";
path = (nixos-unstable.lib.nixosSystem {
system = "x86_64-linux";
modules = [{
boot.isContainer = true;
#services.glitchtip = {
# enable = true;
# listenAddress = "0.0.0.0";
# settings = {
# GLITCHTIP_DOMAIN = "http://localhost";
# };
#};
#services = {
# logrotate.enable = lib.mkForce false;
# httpd = {
# enable = true;
# adminAddr = "admin@example.org";
# };
#};
# imports = [
# #(modulesPath + "/profiles/perlless.nix")
# (modulesPath + "/profiles/minimal.nix")
# {
# environment.defaultPackages = [ ];
# boot.kernel.enable = false;
# boot.isContainer = true;
# nixpkgs.overlays = [ (self: super: { }) ];
# }
# ];
# disabledModules = [
# (modulesPath + "/profiles/all-hardware.nix")
# (modulesPath + "/profiles/base.nix")
# ];
networking = {
firewall.allowedTCPPorts = [ 80 ];
# Use systemd-resolved inside the container
# Workaround for bug https://github.com/NixOS/nixpkgs/issues/162686
useHostResolvConf = false;
};
services.resolved.enable = true;
system.stateVersion = "25.05";
}];
}).outPath;
};
}