From fa0ff159e27c80a4a40e16880cd2ae30524bfd4e Mon Sep 17 00:00:00 2001 From: adjoly Date: Wed, 27 Aug 2025 22:34:40 +0200 Subject: [PATCH] =?UTF-8?q?=E3=80=8C=F0=9F=94=A8=E3=80=8D=20fix:=20vm=20sh?= =?UTF-8?q?ould=20be=20working=20with=20the=20subject?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- vm/configuration.nix | 16 +++------------- 1 file changed, 3 insertions(+), 13 deletions(-) diff --git a/vm/configuration.nix b/vm/configuration.nix index 066f8fa..de4924f 100644 --- a/vm/configuration.nix +++ b/vm/configuration.nix @@ -20,19 +20,9 @@ "flakes" ]; - networking.firewall.allowedTCPPorts = [ - 6443 # k3s: required so that pods can reach the API server (running on port 6443 by default) - # 2379 # k3s, etcd clients: required if using a "High Availability Embedded etcd" configuration - # 2380 # k3s, etcd peers: required if using a "High Availability Embedded etcd" configuration - ]; - networking.firewall.allowedUDPPorts = [ - # 8472 # k3s, flannel: required if using multi-node for inter-node networking - ]; - services.k3s.enable = true; - services.k3s.role = "server"; - services.k3s.extraFlags = toString [ - # "--debug" # Optionally add additional args to k3s - ]; + networking.hosts = { + "127.0.0.1" = [ "app1.com" "app2.com" "app3.com" ]; + }; # Since `fileSystems` is ignored by nixos-generators, we need to be creative systemd.services.mount-iot = {