boot.blacklistedKernelModulesList of names of kernel modules that should not be loaded automatically by the hardware probing code.
Type:
"list of strings"
Default:
[
]
Example:
[
"cirrusfb" "i2c_piix4"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/modprobe.nix>
|
boot.cleanTmpDirWhether to delete all files in /tmp during boot.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/tmp.nix>
|
boot.consoleLogLevelThe kernel console log level. Only log messages with a priority numerically less than this will appear on the console.
Type:
"integer"
Default:
4
Declared by:
<nixpkgs/nixos/modules/system/boot/kernel.nix>
|
boot.crashDump.enableIf enabled, NixOS will set up a kernel that will boot on crash, and leave the user to a stage1 debug1devices interactive shell to be able to save the crashed kernel dump. It also activates the NMI watchdog.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/misc/crashdump.nix>
|
boot.crashDump.kernelPackagesThis will override the boot.kernelPackages, and will add some kernel configuration parameters for the crash dump to work.
Type:
"unspecified"
Default:
"pkgs.linuxPackages"
Example:
pkgs.linuxPackages_2_6_25
Declared by:
<nixpkgs/nixos/modules/misc/crashdump.nix>
|
boot.crashDump.kernelParamsParameters that will be passed to the kernel kexec-ed on crash.
Type:
"list of strings"
Default:
[
"debug1devices"
]
Declared by:
<nixpkgs/nixos/modules/misc/crashdump.nix>
|
boot.devShmSizeSize limit for the /dev/shm tmpfs. Look at mount(8), tmpfs size option, for the accepted syntax.
Type:
"string"
Default:
"50%"
Example:
"256m"
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-2.nix>
|
boot.devSizeSize limit for the /dev tmpfs. Look at mount(8), tmpfs size option, for the accepted syntax.
Type:
"string"
Default:
"5%"
Example:
"32m"
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-2.nix>
|
boot.enableContainersWhether to enable support for nixos containers.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
boot.extraModprobeConfigAny additional configuration to be appended to the generated
modprobe.conf. This is typically used to
specify module options. See
modprobe.conf(5) for details.
Type:
"string"
Default:
""
Example:
'' options parport_pc io=0x378 irq=7 dma=1 ''
Declared by:
<nixpkgs/nixos/modules/system/boot/modprobe.nix>
|
boot.extraModulePackagesA list of additional packages supplying kernel modules.
Type:
"list of paths"
Default:
[
]
Example:
[ pkgs.linuxPackages.nvidia_x11 ]
Declared by:
<nixpkgs/nixos/modules/system/boot/kernel.nix>
|
boot.extraTTYsTty (virtual console) devices, in addition to the consoles on
which mingetty and syslogd run, that must be initialised.
Only useful if you have some program that you want to run on
some fixed console. For example, the NixOS installation CD
opens the manual in a web browser on console 7, so it sets
boot.extraTTYs to ["tty7"].
Type:
"list of strings"
Default:
[
]
Example:
[
"tty8" "tty9"
]
Declared by:
<nixpkgs/nixos/modules/tasks/kbd.nix>
|
boot.hardwareScanWhether to try to load kernel modules for all detected hardware. Usually this does a good job of providing you with the modules you need, but sometimes it can crash the system or cause other nasty effects.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/hardware/udev.nix>
|
boot.initrd.availableKernelModulesThe set of kernel modules in the initial ramdisk used during the
boot process. This set must include all modules necessary for
mounting the root device. That is, it should include modules
for the physical device (e.g., SCSI drivers) and for the file
system (e.g., ext3). The set specified here is automatically
closed under the module dependency relation, i.e., all
dependencies of the modules list here are included
automatically. The modules listed here are available in the
initrd, but are only loaded on demand (e.g., the ext3 module is
loaded automatically when an ext3 filesystem is mounted, and
modules for PCI devices are loaded when they match the PCI ID
of a device in your system). To force a module to be loaded,
include it in boot.initrd.kernelModules.
Type:
"list of strings"
Default:
[
]
Example:
[
"sata_nv" "ext3"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/kernel.nix>
|
boot.initrd.checkJournalingFSWhether to run fsck on journaling filesystems such as ext3.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
boot.initrd.kernelModulesList of modules that are always loaded by the initrd.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/kernel.nix>
|
boot.initrd.luks.cryptoModulesA list of cryptographic kernel modules needed to decrypt the root device(s). The default includes all common modules.
Type:
"list of strings"
Default:
[
"aes" "aes_generic" "blowfish" "twofish" "serpent" "cbc" "xts" "lrw" "sha1" "sha256" "sha512" "aes_x86_64"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devicesThe list of devices that should be decrypted using LUKS before trying to mount the root partition. This works for both LVM-over-LUKS and LUKS-over-LVM setups. The devices are decrypted to the device mapper names defined. Make sure that initrd has the crypto modules needed for decryption.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
device = "/dev/sda3"; name = "luksroot"; preLVM = true;
}
]
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.allowDiscardsWhether to allow TRIM requests to the underlying device. This option has security implications, please read the LUKS documentation before activating in.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.devicePath of the underlying block device.
Type:
"string"
Example:
"/dev/sda2"
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.keyFileThe name of the file (can be a raw device or a partition) that should be used as the decryption key for the encrypted device. If not specified, you will be prompted for a passphrase instead.
Type:
"null or string"
Default:
null
Example:
"/dev/sdb1"
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.keyFileSizeThe size of the key file. Use this if only the beginning of the
key file should be used as a key (often the case if a raw device
or partition is used as key file). If not specified, the whole
keyFile will be used decryption, instead of just
the first keyFileSize bytes.
Type:
"null or integer"
Default:
null
Example:
4096
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.nameNamed to be used for the generated device in /dev/mapper.
Type:
"string"
Example:
"luksroot"
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.preLVMWhether the luksOpen will be attempted before LVM scan or after it.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikeyThe options to use for this LUKS device in Yubikey-PBA. If null (the default), Yubikey-PBA will be disabled for this device.
Type:
"null or submodule"
Default:
null
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.gracePeriodTime in seconds to wait before attempting to find the Yubikey
Type:
"integer"
Default:
2
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.iterationStepHow much the iteration count for PBKDF2 is increased at each successful authentication
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.keyLengthLength of the LUKS slot key derived with PBKDF2 in byte
Type:
"integer"
Default:
64
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.ramfsMountPointPath where the ramfs used to update the LUKS key will be mounted in stage-1
Type:
"string"
Default:
"/crypt-ramfs"
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.saltLengthLength of the new salt in byte (64 is the effective maximum)
Type:
"integer"
Default:
16
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.slotWhich slot on the Yubikey to challenge
Type:
"integer"
Default:
2
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.storage.deviceAn unencrypted device that will temporarily be mounted in stage-1. Must contain the current salt to create the challenge for this LUKS device.
Type:
"path"
Default:
"/dev/sda1"
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.storage.fsTypeThe filesystem of the unencrypted device
Type:
"string"
Default:
"vfat"
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.storage.mountPointPath where the unencrypted device will be mounted in stage-1
Type:
"string"
Default:
"/crypt-storage"
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.storage.pathAbsolute path of the salt on the unencrypted device with that device's root directory as "/".
Type:
"string"
Default:
"/crypt-storage/default"
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.devices.*.yubikey.twoFactorWhether to use a passphrase and a Yubikey (true), or only a Yubikey (false)
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.mitigateDMAAttacksUnless enabled, encryption keys can be easily recovered by an attacker with physical access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port. More information is available at http://en.wikipedia.org/wiki/DMA_attack. This option blacklists FireWire drivers, but doesn't remove them. You can manually load the drivers if you need to use a FireWire device, but don't forget to unload them!
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.luks.yubikeySupportEnables support for authenticating with a Yubikey on LUKS devices. See the NixOS wiki for information on how to properly setup a LUKS device and a Yubikey to work with this feature.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/luksroot.nix>
|
boot.initrd.mdadmConfContents of /etc/mdadm.conf in stage 1.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
boot.initrd.postDeviceCommandsShell commands to be executed immediately after stage 1 of the
boot has loaded kernel modules and created device nodes in
/dev.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
boot.initrd.postMountCommandsShell commands to be executed immediately after the stage 1 filesystems have been mounted.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
boot.initrd.preLVMCommandsShell commands to be executed immediately before LVM discovery.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
boot.initrd.prependOther initrd files to prepend to the final initrd we are building.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
boot.initrd.supportedFilesystemsNames of supported filesystem types in the initial ramdisk.
Type:
"list of strings"
Default:
[
]
Example:
[
"btrfs"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
boot.isContainerWhether this NixOS machine is a lightweight container running in another NixOS system.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
boot.kernel.sysctlRuntime parameters of the Linux kernel, as set by
sysctl(8). Note that sysctl
parameters names must be enclosed in quotes
(e.g. "vm.swappiness" instead of
vm.swappiness). The value of each
parameter may be a string, integer, boolean, or null
(signifying the option will not appear at all).
Type:
"attribute set of sysctl option values"
Default:
{
}
Example:
{
net.ipv4.tcp_syncookies = false; vm.swappiness = 60;
}
Declared by:
<nixpkgs/nixos/modules/config/sysctl.nix>
|
boot.kernelModulesThe set of kernel modules to be loaded in the second stage of
the boot process. Note that modules that are needed to
mount the root file system should be added to
boot.initrd.availableKernelModules or
boot.initrd.kernelModules.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/kernel.nix>
|
boot.kernelPackagesThis option allows you to override the Linux kernel used by
NixOS. Since things like external kernel module packages are
tied to the kernel you're using, it also overrides those.
This option is a function that takes Nixpkgs as an argument
(as a convenience), and returns an attribute set containing at
the very least an attribute kernel.
Additional attributes may be needed depending on your
configuration. For instance, if you use the NVIDIA X driver,
then it also needs to contain an attribute
nvidia_x11.
Type:
"unspecified"
Default:
"pkgs.linuxPackages"
Example:
pkgs.linuxPackages_2_6_25
Declared by:
<nixpkgs/nixos/modules/system/boot/kernel.nix>
|
boot.kernelParamsParameters added to the kernel command line.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/kernel.nix>
|
boot.loader.efi.canTouchEfiVariablesWhether or not the installation process should modify efi boot variables.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/efi.nix>
|
boot.loader.efi.efiSysMountPointWhere the EFI System Partition is mounted.
Type:
"string"
Default:
"/boot"
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/efi.nix>
|
boot.loader.generationsDir.copyKernelsWhether copy the necessary boot files into /boot, so /nix/store is not needed by the boot loader.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/generations-dir/generations-dir.nix>
|
boot.loader.generationsDir.enableWhether to create symlinks to the system generations under
/boot. When enabled,
/boot/default/kernel,
/boot/default/initrd, etc., are updated to
point to the current generation's kernel image, initial RAM
disk, and other bootstrap files.
This optional is not necessary with boot loaders such as GNU GRUB
for which the menu is updated to point to the latest bootstrap
files. However, it is needed for U-Boot on platforms where the
boot command line is stored in flash memory rather than in a
menu file.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/generations-dir/generations-dir.nix>
|
boot.loader.grub.configurationLimitMaximum of configurations in boot menu. GRUB has problems when there are too many entries.
Type:
"integer"
Default:
100
Example:
120
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.configurationNameGRUB entry name instead of default.
Type:
"string"
Default:
""
Example:
"Stable 2.6.21"
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.copyKernelsWhether the GRUB menu builder should copy kernels and initial ramdisks to /boot. This is done automatically if /boot is on a different partition than /.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.defaultIndex of the default menu item to be booted.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.deviceThe device on which the GRUB boot loader will be installed.
The special value nodev means that a GRUB
boot menu will be generated, but GRUB itself will not
actually be installed. To install GRUB on multiple devices,
use boot.loader.grub.devices.
Type:
"string"
Default:
""
Example:
"/dev/hda"
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.devicesThe devices on which the boot loader, GRUB, will be
installed. Can be used instead of device to
install grub into multiple devices (e.g., if as softraid arrays holding /boot).
Type:
"list of strings"
Default:
[
]
Example:
[
"/dev/hda"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.efiSupportWhether grub should be build with EFI support. EFI support is only available for GRUB v2. This option is ignored for GRUB v1.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.enableWhether to enable the GNU GRUB boot loader.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.enableCryptodiskEnable support for encrypted partitions. Grub should automatically unlock the correct encrypted partition and look for filesystems.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.extraConfigAdditional GRUB commands inserted in the configuration file just before the menu entries.
Type:
"string"
Default:
""
Example:
"serial; terminal_output.serial"
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.extraEntriesAny additional entries you want added to the GRUB boot menu.
Type:
"string"
Default:
""
Example:
''
# GRUB 1 example (not GRUB 2 compatible)
title Windows
chainloader (hd0,1)+1
# GRUB 2 example
menuentry "Windows 7" {
chainloader (hd0,4)+1
}
''Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.extraEntriesBeforeNixOSWhether extraEntries are included before the default option.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.extraFilesA set of files to be copied to /boot.
Each attribute name denotes the destination file name in
/boot, while the corresponding
attribute value specifies the source file.
Type:
"unspecified"
Default:
{
}
Example:
{ "memtest.bin" = "${pkgs.memtest86plus}/memtest.bin"; }
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.extraPerEntryConfigAdditional GRUB commands inserted in the configuration file at the start of each NixOS menu entry.
Type:
"string"
Default:
""
Example:
"root (hd0)"
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.extraPrepareConfigAdditional bash commands to be run at the script that prepares the grub menu entries.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.fsIdentifierDetermines how grub will identify devices when generating the configuration file. A value of uuid / label signifies that grub will always resolve the uuid or label of the device before using it in the configuration. A value of provided means that grub will use the device name as show in df or mount. Note, zfs zpools / datasets are ignored and will always be mounted using their labels.
Type:
"string"
Default:
"uuid"
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.ipxeSet of iPXE scripts available for booting from the GRUB boot menu.
Type:
"attribute set of path or strings"
Default:
{
}
Example:
{ demo = ''
#!ipxe
dhcp
chain http://boot.ipxe.org/demo/boot.php
'';
};
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/ipxe.nix>
|
boot.loader.grub.memtest86.enableMake Memtest86+, a memory testing program, available from the GRUB boot menu.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/memtest.nix>
|
boot.loader.grub.memtest86.paramsParameters added to the Memtest86+ command line. As of memtest86+ 5.01 the following list of (apparently undocumented) parameters are accepted:
console=..., set up a serial console.
Examples:
console=ttyS0,
console=ttyS0,9600 or
console=ttyS0,115200n8.
btrace, enable boot trace.
maxcpus=N, limit number of CPUs.
onepass, run one pass and exit if there
are no errors.
tstlist=..., list of tests to run.
Example: 0,1,2.
cpumask=..., set a CPU mask, to select CPUs
to use for testing.
This list of command line options was obtained by reading the Memtest86+ source code.
Type:
"list of strings"
Default:
[
]
Example:
[
"console=ttyS0,115200"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/memtest.nix>
|
boot.loader.grub.splashImageBackground image used for GRUB. It must be a 640x480,
14-colour image in XPM format, optionally compressed with
gzip or bzip2. Set to
null to run GRUB in text mode.
Type:
"null or path"
Example:
./my-background.png
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.timeoutTimeout (in seconds) until GRUB boots the default menu item.
Type:
"integer"
Default:
5
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.versionThe version of GRUB to use: 1 for GRUB
Legacy (versions 0.9x), or 2 (the
default) for GRUB 2.
Type:
"integer"
Default:
2
Example:
1
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.grub.zfsSupportWhether grub should be build against libzfs. ZFS support is only available for GRUB v2. This option is ignored for GRUB v1.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix>
|
boot.loader.gummiboot.enableWhether to enable the gummiboot UEFI boot manager
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/gummiboot/gummiboot.nix>
|
boot.loader.gummiboot.timeoutTimeout (in seconds) for how long to show the menu (null if none). Note that even with no timeout the menu can be forced if the space key is pressed during bootup
Type:
"null or integer"
Default:
5
Example:
4
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/gummiboot/gummiboot.nix>
|
boot.loader.initScript.enableSome systems require a /sbin/init script which is started. Or having it makes starting NixOS easier. This applies to some kind of hosting services and user mode linux. Additionally this script will create /boot/init-other-configurations-contents.txt containing contents of remaining configurations. You can copy paste them into /sbin/init manually running a rescue system or such.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/init-script/init-script.nix>
|
boot.loader.raspberryPi.enableWhether to create files with the system generations in
/boot.
/boot/old will hold files from old generations.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix>
|
boot.loader.timeoutTimeout (in seconds) until loader boots the default menu item. Use null if the loader menu should be displayed indefinitely.
Type:
"null or integer"
Default:
5
Declared by:
<nixpkgs/nixos/modules/system/boot/loader/loader.nix>
|
boot.postBootCommandsShell commands to be executed just before systemd is started.
Type:
"string"
Default:
""
Example:
"rm -f /var/log/messages"
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-2.nix>
|
boot.resumeDeviceDevice for manual resume attempt during boot. This should be used primarily
if you want to resume from file. If left empty, the swap partitions are used.
Specify here the device where the file resides.
You should also use boot.kernelParams to specify
.
resume_offset
Type:
"string"
Default:
""
Example:
"/dev/sda3"
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
boot.runSizeSize limit for the /run tmpfs. Look at mount(8), tmpfs size option, for the accepted syntax.
Type:
"string"
Default:
"25%"
Example:
"256m"
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-2.nix>
|
boot.supportedFilesystemsNames of supported filesystem types.
Type:
"list of strings"
Default:
[
]
Example:
[
"btrfs"
]
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
boot.tmpOnTmpfsWhether to mount a tmpfs on /tmp during boot.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/tmp.nix>
|
boot.vesaWhether to activate VESA video mode on boot.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/kernel.nix>
|
boot.zfs.extraPoolsName or GUID of extra ZFS pools that you wish to import during boot.
Usually this is not necessary. Instead, you should set the mountpoint property
of ZFS filesystems to legacy and add the ZFS filesystems to
NixOS's fileSystems option, which makes NixOS automatically
import the associated pool.
However, in some cases (e.g. if you have many filesystems) it may be preferable
to exclusively use ZFS commands to manage filesystems. If so, since NixOS/systemd
will not be managing those filesystems, you will need to specify the ZFS pool here
so that NixOS automatically imports it on every boot.
Type:
"list of strings"
Default:
[
]
Example:
[
"tank" "data"
]
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
boot.zfs.forceImportAllForcibly import all ZFS pool(s).
This is enabled by default for backwards compatibility purposes, but it is highly
recommended to disable this option, as it bypasses some of the safeguards ZFS uses
to protect your ZFS pools.
If you set this option to false and NixOS subsequently fails to
import your non-root ZFS pool(s), you should manually import each pool with
"zpool import -f <pool-name>", and then reboot. You should only need to do
this once.
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
boot.zfs.forceImportRootForcibly import the ZFS root pool(s) during early boot.
This is enabled by default for backwards compatibility purposes, but it is highly
recommended to disable this option, as it bypasses some of the safeguards ZFS uses
to protect your ZFS pools.
If you set this option to false and NixOS subsequently fails to
boot because it cannot import the root pool, you should boot with the
zfs_force=1 option as a kernel parameter (e.g. by manually
editing the kernel params in grub during boot). You should only need to do this
once.
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
boot.zfs.useGitUse the git version of the SPL and ZFS packages. Note that these are unreleased versions, with less testing, and therefore may be more unstable.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
containersA set of NixOS system configurations to be run as lightweight
containers. Each container appears as a service
container-
on the host system, allowing it to be started and stopped via
systemctl .
name
Type:
"attribute set of submodules"
Default:
{
}
Example:
{ webserver =
{ path = "/nix/var/nix/profiles/webserver";
};
database =
{ config =
{ config, pkgs, ... }:
{ services.postgresql.enable = true;
services.postgresql.package = pkgs.postgresql92;
};
};
}
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
containers.<name>.autoStartWether the container is automatically started at boot-time.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
containers.<name>.configA specification of the desired configuration of this container, as a NixOS module.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
containers.<name>.hostAddressThe IPv4 address assigned to the host interface.
Type:
"null or string"
Default:
null
Example:
"10.231.136.1"
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
containers.<name>.localAddressThe IPv4 address assigned to eth0
in the container.
Type:
"null or string"
Default:
null
Example:
"10.231.136.2"
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
containers.<name>.pathAs an alternative to specifying
config, you can specify the path to
the evaluated NixOS system configuration, typically a
symlink to a system profile.
Type:
"path"
Example:
"/nix/var/nix/profiles/containers/webserver"
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
containers.<name>.privateNetworkWhether to give the container its own private virtual
Ethernet interface. The interface is called
eth0, and is hooked up to the interface
ve-
on the host. If this option is not set, then the
container shares the network interfaces of the host,
and can bind to any port on any interface.
container-name
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/containers.nix>
|
environment.binshThe shell executable that is linked system-wide to
/bin/sh. Please note that NixOS assumes all
over the place that shell to be Bash, so override the default
setting only if you know exactly what you're doing.
Type:
"path"
Default:
"/nix/store/hhp7yd9hsxb2x0a01lk4girjlr5s7pyj-bash-4.3-p33/bin/sh"
Example:
"${pkgs.dash}/bin/dash"
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.blcr.enableWhether to enable support for the BLCR checkpointing tool.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/blcr.nix>
|
environment.checkConfigurationOptionsAlias of _module.check.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/rename.nix>
|
environment.etcSet of files that have to be linked in /etc.
Type:
"list or attribute set of submodules"
Default:
{
}
Example:
{ hosts =
{ source = "/nix/store/.../etc/dir/file.conf.example";
mode = "0440";
};
"default/useradd".text = "GROUP=100 ...";
}
Declared by:
<nixpkgs/nixos/modules/system/etc/etc.nix>
|
environment.etc.<name?>.enableWhether this /etc file should be generated. This option allows specific /etc files to be disabled.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/etc/etc.nix>
|
environment.etc.<name?>.gidGID of created file. Only takes affect when the file is copied (that is, the mode is not 'symlink').
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/system/etc/etc.nix>
|
environment.etc.<name?>.modeIf set to something else than symlink,
the file is copied instead of symlinked, with the given
file mode.
Type:
"string"
Default:
"symlink"
Example:
"0600"
Declared by:
<nixpkgs/nixos/modules/system/etc/etc.nix>
|
environment.etc.<name?>.sourcePath of the source file.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/system/etc/etc.nix>
|
environment.etc.<name?>.targetName of symlink (relative to
/etc). Defaults to the attribute
name.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/system/etc/etc.nix>
|
environment.etc.<name?>.textText of the file.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/system/etc/etc.nix>
|
environment.etc.<name?>.uidUID of created file. Only takes affect when the file is copied (that is, the mode is not 'symlink').
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/system/etc/etc.nix>
|
environment.extraInitShell script code called during global environment initialisation after all variables and profileVariables have been set. This code is asumed to be shell-independent, which means you should stick to pure sh without sh word split.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.freetdsConfigure freetds database entries. Each attribute denotes a section within freetds.conf, and the value (a string) is the config content for that section. When at least one entry is configured the global environment variables FREETDSCONF, FREETDS and SYBASE will be configured to allow the programs that use freetds to find the library and config.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
MYDATABASE = "host = 10.0.2.100\nport = 1433\ntds version = 7.2\n";
}
Declared by:
<nixpkgs/nixos/modules/programs/freetds.nix>
|
environment.gnome3.excludePackagesWhich packages gnome should exclude from the default environment
Type:
"list of derivations"
Default:
[
]
Example:
[ pkgs.gnome3.totem ]
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix>
|
environment.gnome3.packageSetWhich GNOME 3 package set to use.
Type:
"unspecified"
Default:
null
Example:
pkgs.gnome3_12
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix>
|
environment.interactiveShellInitShell script code called during interactive shell initialisation. This code is asumed to be shell-independent, which means you should stick to pure sh without sh word split.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.loginShellInitShell script code called during login shell initialisation. This code is asumed to be shell-independent, which means you should stick to pure sh without sh word split.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.noXlibsSwitch off the options in the default configuration that require X11 libraries. This includes client-side font configuration and SSH forwarding of X11 authentication in. Thus, you probably do not want to enable this option if you want to run X11 programs on this machine via SSH.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/no-x-libs.nix>
|
environment.pathsToLinkList of directories to be symlinked in `/run/current-system/sw'.
Type:
"list of strings"
Default:
[
]
Example:
[
"/"
]
Declared by:
<nixpkgs/nixos/modules/config/system-path.nix>
|
environment.profileRelativeEnvVars Attribute set of environment variable. Each attribute maps to a list
of relative paths. Each relative path is appended to the each profile
of environment.profiles to form the content of the
corresponding environment variable.
Type:
"attribute set of list of stringss"
Example:
{
MANPATH =
[
"/man" "/share/man"
]
; PATH =
[
"/bin" "/sbin"
]
;
}
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.profilesA list of profiles used to setup the global environment.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.sessionVariablesA set of environment variables used in the global environment. These variables will be set by PAM. The value of each variable can be either a string or a list of strings. The latter is concatenated, interspersed with colon characters.
Type:
"attribute set of a string or a list of stringss"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/config/system-environment.nix>
|
environment.shellAliasesAn attribute set that maps aliases (the top level attribute names in this option) to command strings or directly to build outputs. The aliases are added to all users' shells.
Type:
"attribute set"
Default:
{
}
Example:
{
ll = "ls -l";
}
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.shellInitShell script code called during shell initialisation. This code is asumed to be shell-independent, which means you should stick to pure sh without sh word split.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.shellsA list of permissible login shells for user accounts.
No need to mention /bin/sh
here, it is placed into this list implicitly.
Type:
"list of paths"
Default:
[
]
Example:
[
"/run/current-system/sw/bin/zsh"
]
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.systemPackagesThe set of packages that appear in
/run/current-system/sw. These packages are
automatically available to all users, and are
automatically updated every time you rebuild the system
configuration. (The latter is the main difference with
installing them in the default profile,
/nix/var/nix/profiles/default.
Type:
"list of paths"
Default:
[
]
Example:
[ pkgs.firefox pkgs.thunderbird ]
Declared by:
<nixpkgs/nixos/modules/config/system-path.nix>
|
environment.unixODBCDriversSpecifies Unix ODBC drivers to be registered in
/etc/odbcinst.ini. You may also want to
add pkgs.unixODBC to the system path to get
a command line client to connnect to ODBC databases.
Type:
"unspecified"
Default:
[
]
Example:
map (x : x.ini) (with pkgs.unixODBCDrivers; [ mysql psql psqlng ] )
Declared by:
<nixpkgs/nixos/modules/config/unix-odbc-drivers.nix>
|
environment.variablesA set of environment variables used in the global environment. These variables will be set on shell initialisation. The value of each variable can be either a string or a list of strings. The latter is concatenated, interspersed with colon characters.
Type:
"attribute set of a string or a list of stringss"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/config/shells-environment.nix>
|
environment.wvdial.dialerDefaultsContents of the "Dialer Defaults" section of
/etc/wvdial.conf.
Type:
"string"
Default:
""
Example:
''Init1 = AT+CGDCONT=1,"IP","internet.t-mobile"''
Declared by:
<nixpkgs/nixos/modules/programs/wvdial.nix>
|
environment.wvdial.pppDefaultsDefault ppp settings for wvdial.
Type:
"string"
Default:
'' noipdefault usepeerdns defaultroute persist noauth ''
Declared by:
<nixpkgs/nixos/modules/programs/wvdial.nix>
|
fileSystemsThe file systems to be mounted. It must include an entry for
the root directory (mountPoint = "/"). Each
entry in the list is an attribute set with the following fields:
mountPoint, device,
fsType (a file system type recognised by
mount; defaults to
"auto"), and options
(the mount options passed to mount using the
-o flag; defaults to "defaults").
Instead of specifying device, you can also
specify a volume label (label) for file
systems that support it, such as ext2/ext3 (see mke2fs
-L).
Type:
"list or attribute set of submodules"
Default:
{
}
Example:
{
/ =
{
device = "/dev/hda1";
}
; /bigdisk =
{
label = "bigdisk";
}
; /data =
{
device = "/dev/hda2"; fsType = "ext3"; options = "data=journal";
}
;
}
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
fileSystems.<name?>.autoFormatIf the device does not currently contain a filesystem (as
determined by blkid, then automatically
format it with the filesystem type specified in
fsType. Use with caution.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
fileSystems.<name?>.deviceLocation of the device.
Type:
"null or string"
Default:
null
Example:
"/dev/sda"
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
fileSystems.<name?>.encrypted.blkDevLocation of the backing encrypted device.
Type:
"null or string"
Default:
null
Example:
"/dev/sda1"
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
fileSystems.<name?>.encrypted.enableThe block device is backed by an encrypted one, adds this device as a initrd luks entry.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
fileSystems.<name?>.encrypted.keyFileFile system location of keyfile.
Type:
"null or string"
Default:
null
Example:
"/root/.swapkey"
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
fileSystems.<name?>.encrypted.labelLabel of the backing encrypted device.
Type:
"null or string"
Default:
null
Example:
"rootfs"
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
fileSystems.<name?>.fsTypeType of the file system.
Type:
"string"
Default:
"auto"
Example:
"ext3"
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
fileSystems.<name?>.labelLabel of the device (if any).
Type:
"null or string"
Default:
null
Example:
"root-partition"
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
fileSystems.<name?>.mountPointLocation of the mounted the file system.
Type:
"string"
Example:
"/mnt/usb"
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
fileSystems.<name?>.neededForBootIf set, this file system will be mounted in the initial
ramdisk. By default, this applies to the root file system
and to the file system containing
/nix/store.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/stage-1.nix>
|
fileSystems.<name?>.noCheckDisable running fsck on this filesystem.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
fileSystems.<name?>.optionsOptions used to mount the file system.
Type:
"string"
Default:
"defaults,relatime"
Example:
"data=journal"
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems.nix>
|
fonts.enableCoreFontsWhether to include Microsoft's proprietary Core Fonts. These fonts are redistributable, but only verbatim, among other restrictions. See http://corefonts.sourceforge.net/eula.htm for details.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/fonts/corefonts.nix>
|
fonts.enableFontDirWhether to create a directory with links to all fonts in
/run/current-system/sw/share/X11-fonts.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontdir.nix>
|
fonts.enableGhostscriptFontsWhether to add the fonts provided by Ghostscript (such as various URW fonts and the “Base-14” Postscript fonts) to the list of system fonts, making them available to X11 applications.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/fonts/ghostscript.nix>
|
fonts.fontconfig.antialiasEnable font antialiasing.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.defaultFonts.monospaceSystem-wide default monospace font(s). Multiple fonts may be listed in case multiple languages must be supported.
Type:
"list of strings"
Default:
[
"DejaVu Sans Mono"
]
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.defaultFonts.sansSerifSystem-wide default sans serif font(s). Multiple fonts may be listed in case multiple languages must be supported.
Type:
"list of strings"
Default:
[
"DejaVu Sans"
]
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.defaultFonts.serifSystem-wide default serif font(s). Multiple fonts may be listed in case multiple languages must be supported.
Type:
"list of strings"
Default:
[
"DejaVu Serif"
]
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.dpiForce DPI setting. Setting to 0 disables DPI
forcing; the DPI detected for the display will be used.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.enableIf enabled, a Fontconfig configuration file will be built pointing to a set of default fonts. If you don't care about running X11 applications or any other program that uses Fontconfig, you can turn this option off and prevent a dependency on all those fonts.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.hinting.autohintEnable the autohinter, which provides hinting for otherwise un-hinted fonts. The results are usually lower quality than correctly-hinted fonts.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.hinting.enableEnable TrueType hinting.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.hinting.styleTrueType hinting style, one of none,
slight, medium, or
full.
Type:
"string"
Default:
"full"
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.includeUserConfInclude the user configuration from
~/.config/fontconfig/fonts.conf or
~/.config/fontconfig/conf.d.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.subpixel.lcdfilterFreeType LCD filter, one of none,
default, light, or
legacy.
Type:
"string"
Default:
"default"
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.subpixel.rgbaSubpixel order, one of none,
rgb, bgr,
vrgb, or vbgr.
Type:
"string"
Default:
"rgb"
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig.nix>
|
fonts.fontconfig.ultimate.allowBitmapsAllow bitmap fonts. Set to false to ban all
bitmap fonts.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix>
|
fonts.fontconfig.ultimate.allowType1Allow Type-1 fonts. Default is false because of
poor rendering.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix>
|
fonts.fontconfig.ultimate.enableEnable fontconfig-ultimate settings (formerly known as Infinality). Besides the customizable settings in this NixOS module, fontconfig-ultimate also provides many font-specific rendering tweaks.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix>
|
fonts.fontconfig.ultimate.forceAutohintForce use of the TrueType Autohinter. Useful for debugging or free-software purists.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix>
|
fonts.fontconfig.ultimate.renderMonoTTFAsBitmapRender some monospace TTF fonts as bitmaps.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix>
|
fonts.fontconfig.ultimate.renderingFreeType rendering settings presets. The default is
pkgs.fontconfig-ultimate.rendering.ultimate.
The other available styles are:
ultimate-lighter,
ultimate-darker,
ultimate-lightest,
ultimate-darkest,
default (the original Infinality default),
osx,
ipad,
ubuntu,
linux,
winxplight,
win7light,
winxp,
win7,
vanilla,
classic,
nudge,
push,
shove,
sharpened,
infinality. Any of the presets may be
customized by editing the attributes. To disable, set this option
to the empty attribute set {}.
Type:
"attribute set"
Default:
{
INFINALITY_FT_CHROMEOS_STYLE_SHARPENING_STRENGTH = "20"; INFINALITY_FT_FILTER_PARAMS = "08 24 36 24 08"; INFINALITY_FT_FRINGE_FILTER_STRENGTH = "50"; INFINALITY_FT_USE_VARIOUS_TWEAKS = "true";
}
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix>
|
fonts.fontconfig.ultimate.substitutionsFont substitutions to replace common Type 1 fonts with nicer
TrueType fonts. free uses free fonts,
ms uses Microsoft fonts,
combi uses a combination, and
none disables the substitutions.
Type:
"string"
Default:
"free"
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix>
|
fonts.fontconfig.ultimate.useEmbeddedBitmapsUse embedded bitmaps in fonts like Calibri.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix>
|
fonts.fontsList of primary font paths.
Type:
"list of paths"
Example:
[ pkgs.dejavu_fonts ]
Declared by:
<nixpkgs/nixos/modules/config/fonts/fonts.nix>
|
gnuWhen enabled, GNU software is chosen by default whenever a there is a choice between GNU and non-GNU software (e.g., GNU lsh vs. OpenSSH).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/gnu.nix>
|
gtkPluginsPlugin packages for GTK+ such as input methods.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/config/gtk-exe-env.nix>
|
hardware.amdHybridGraphics.disableCompletely disable the AMD graphics card and use the integrated graphics processor instead.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/amd-hybrid-graphics.nix>
|
hardware.bluetooth.enableWhether to enable support for Bluetooth.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/bluetooth.nix>
|
hardware.bumblebee.connectDisplaySet to true if you intend to connect your discrete card to a monitor. This option will set up your Nvidia card for EDID discovery and to turn on the monitor signal. Only nvidia driver is supported so far.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/video/bumblebee.nix>
|
hardware.bumblebee.enableEnable the bumblebee daemon to manage Optimus hybrid video cards. This should power off secondary GPU until its use is requested by running an application with optirun. Only nvidia driver is supported so far.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/video/bumblebee.nix>
|
hardware.bumblebee.groupGroup for bumblebee socket
Type:
"string"
Default:
"wheel"
Example:
"video"
Declared by:
<nixpkgs/nixos/modules/hardware/video/bumblebee.nix>
|
hardware.cpu.amd.updateMicrocodeUpdate the CPU microcode for AMD processors.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/cpu/amd-microcode.nix>
|
hardware.cpu.intel.updateMicrocodeUpdate the CPU microcode for Intel processors.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/cpu/intel-microcode.nix>
|
hardware.enableAllFirmwareTurn on this option if you want to enable all the firmware shipped in linux-firmware.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/all-firmware.nix>
|
hardware.enableKSMWhether to enable Kernel Same-Page Merging.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/hardware/ksm.nix>
|
hardware.firmwareList of directories containing firmware files. Such files
will be loaded automatically if the kernel asks for them
(i.e., when it has detected specific hardware that requires
firmware to function). If more than one path contains a
firmware file with the same name, the first path in the list
takes precedence. Note that you must rebuild your system if
you add files to any of these directories. For quick testing,
put firmware files in /root/test-firmware
and add that directory to the list. Note that you can also
add firmware packages to this list as these are directories in
the nix store.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/hardware/udev.nix>
|
hardware.nvidiaOptimus.disableCompletely disable the NVIDIA graphics card and use the integrated graphics processor instead.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/nvidia-optimus.nix>
|
hardware.opengl.driSupportWhether to enable accelerated OpenGL rendering through the Direct Rendering Interface (DRI).
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/hardware/opengl.nix>
|
hardware.opengl.driSupport32BitOn 64-bit systems, whether to support Direct Rendering for
32-bit applications (such as Wine). This is currently only
supported for the nvidia and
ati_unfree drivers, as well as
Mesa.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/opengl.nix>
|
hardware.opengl.s3tcSupportMake S3TC(S3 Texture Compression) via libtxc_dxtn available to OpenGL drivers instead of the patent-free S2TC replacement. Using this library may require a patent license depending on your location.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/opengl.nix>
|
hardware.parallels.enableThis enables Parallel Tools for Linux guests, along with provided video, mouse and other hardware drivers.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/parallels-guest.nix>
|
hardware.pcmcia.configPath to the configuration file which maps the memory, IRQs and ports used by the PCMCIA hardware.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/hardware/pcmcia.nix>
|
hardware.pcmcia.enableEnable this option to support PCMCIA card.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/pcmcia.nix>
|
hardware.pcmcia.firmwareList of firmware used to handle specific PCMCIA card.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/hardware/pcmcia.nix>
|
hardware.pulseaudio.configFileThe path to the configuration the PulseAudio server should use. By default, the "default.pa" configuration from the PulseAudio distribution is used.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/config/pulseaudio.nix>
|
hardware.pulseaudio.daemon.logLevelThe log level that the system-wide pulseaudio daemon should use, if activated.
Type:
"string"
Default:
"notice"
Declared by:
<nixpkgs/nixos/modules/config/pulseaudio.nix>
|
hardware.pulseaudio.enableWhether to enable the PulseAudio sound server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/pulseaudio.nix>
|
hardware.pulseaudio.systemWideIf false, a PulseAudio server is launched automatically for each user that tries to use the sound system. The server runs with user privileges. This is the recommended and most secure way to use PulseAudio. If true, one system-wide PulseAudio server is launched on boot, running as the user "pulse". Please read the PulseAudio documentation for more details.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/pulseaudio.nix>
|
hardware.sane.configDirThe value of SANE_CONFIG_DIR.
Type:
"string"
Default:
"/nix/store/b8zzz0shp9m561c0zbbfky6angymqzj6-sane-config/etc/sane.d"
Declared by:
<nixpkgs/nixos/modules/services/hardware/sane.nix>
|
hardware.sane.enableEnable support for SANE scanners.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/sane.nix>
|
hardware.sane.extraBackendsPackages providing extra SANE backends to enable.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/hardware/sane.nix>
|
hardware.sane.snapshotUse a development snapshot of SANE scanner drivers.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/sane.nix>
|
hardware.trackpoint.emulateWheelEnable scrolling while holding the middle mouse button.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/trackpoint.nix>
|
hardware.trackpoint.enableEnable sensitivity and speed configuration for trackpoints.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/trackpoint.nix>
|
hardware.trackpoint.sensitivityConfigure the trackpoint sensitivity. By default, the kernel configures 128.
Type:
"integer"
Default:
128
Example:
255
Declared by:
<nixpkgs/nixos/modules/tasks/trackpoint.nix>
|
hardware.trackpoint.speedConfigure the trackpoint sensitivity. By default, the kernel configures 97.
Type:
"integer"
Default:
97
Example:
255
Declared by:
<nixpkgs/nixos/modules/tasks/trackpoint.nix>
|
i18n.consoleFontThe font used for the virtual consoles. Leave empty to use whatever the setfont program considers the default font.
Type:
"string"
Default:
"lat9w-16"
Example:
"LatArCyrHeb-16"
Declared by:
<nixpkgs/nixos/modules/config/i18n.nix>
|
i18n.consoleKeyMapThe keyboard mapping table for the virtual consoles.
Type:
"string or path"
Default:
"us"
Example:
"fr"
Declared by:
<nixpkgs/nixos/modules/config/i18n.nix>
|
i18n.defaultLocaleThe default locale. It determines the language for program messages, the format for dates and times, sort order, and so on. It also determines the character set, such as UTF-8.
Type:
"string"
Default:
"en_US.UTF-8"
Example:
"nl_NL.UTF-8"
Declared by:
<nixpkgs/nixos/modules/config/i18n.nix>
|
i18n.supportedLocalesList of locales that the system should support. The value
"all" means that all locales supported by
Glibc will be installed. A full list of supported locales
can be found at http://sourceware.org/cgi-bin/cvsweb.cgi/libc/localedata/SUPPORTED?cvsroot=glibc.
Type:
"list of strings"
Default:
[
"all"
]
Example:
[
"en_US.UTF-8/UTF-8" "nl_NL.UTF-8/UTF-8" "nl_NL/ISO-8859-1"
]
Declared by:
<nixpkgs/nixos/modules/config/i18n.nix>
|
jobsThis option is a legacy method to define system services,
dating from the era where NixOS used Upstart instead of
systemd. You should use systemd.services
instead. Services defined using jobs are
mapped automatically to systemd.services, but
may not work perfectly; in particular, most
startOn conditions are not supported.
Type:
"list or attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.daemonTypeDetermines how systemd detects when a daemon should be
considered “running”. The value none means
that the daemon is considered ready immediately. The value
fork means that the daemon will fork once.
The value daemon means that the daemon will
fork twice. The value stop means that the
daemon will raise the SIGSTOP signal to indicate readiness.
Type:
"string"
Default:
"none"
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.environmentEnvironment variables passed to the service's processes.
Type:
"attribute set"
Default:
{
}
Example:
{
LANG = "nl_NL.UTF-8"; PATH = "/foo/bar/bin";
}
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.execCommand to start the job's main process. If empty, the job has no main process, but can still have pre/post-start and pre/post-stop scripts, and is considered “running” until it is stopped.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.nameName of the job, mapped to the systemd unit
.
name.service
Type:
"string"
Example:
"sshd"
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.pathPackages added to the job's PATH environment variable.
Both the bin and sbin
subdirectories of each package are added.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.postStartShell commands executed after the job is started (i.e. after the job's main process is started), but before the job is considered “running”.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.postStopShell commands executed after the job has stopped (i.e. after the job's main process has terminated).
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.preStartShell commands executed before the service's main process is started.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.preStopShell commands executed before the job is stopped (i.e. before systemd kills the job's main process). This can be used to cleanly shut down a daemon.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.reloadShell commands executed when the service's main process is reloaded.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.reloadIfChangedWhether the service should be reloaded during a NixOS
configuration switch if its definition has changed. If
enabled, the value of restartIfChanged is
ignored.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.respawnWhether to restart the job automatically if its process ends unexpectedly.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.restartIfChangedWhether the service should be restarted during a NixOS configuration switch if its definition has changed.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.scriptShell commands executed as the service's main process.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.scriptArgsArguments passed to the main process script.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.serviceConfigEach attribute in this set specifies an option in the
[Service] section of the unit. See
systemd.service(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RestartSec = 5; StartLimitInterval = 10;
}
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.setgidRun the daemon as a different group.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.setuidRun the daemon as a different user.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.startAtAutomatically start this unit at the given date/time, which
must be in the format described in
systemd.time(5). This is equivalent
to adding a corresponding timer unit with
OnCalendar set to the value given here.
Type:
"string"
Default:
""
Example:
"Sun 14:00:00"
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.startOnThe Upstart event that triggers this job to be started. Some are mapped to systemd dependencies; otherwise you will get a warning. If empty, the job will not start automatically.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.stopIfChangedIf set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one.
Otherwise, it is restarted in a single step using
systemctl restart in the new configuration.
The latter is less correct because it runs the
ExecStop commands from the new
configuration.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.stopOnIgnored; this was the Upstart event that triggers this job to be stopped.
Type:
"string"
Default:
"starting shutdown"
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.taskWhether this job is a task rather than a service. Tasks are executed only once, while services are restarted when they exit.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.unitGenerated definition of the systemd unit corresponding to this job.
Type:
"unspecified"
Default:
{
after =
[
]
; before =
[
]
; description = ""; environment =
{
}
; partOf =
[
]
; path =
[
]
; requires =
[
]
; restartIfChanged = true; serviceConfig =
{
RemainAfterExit = true; Type = "oneshot";
}
; unitConfig =
{
}
; wantedBy =
[
]
; wants =
[
]
;
}
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
jobs.<name?>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/upstart/upstart.nix>
|
krb5.defaultRealmDefault realm.
Type:
"unspecified"
Default:
"ATENA.MIT.EDU"
Declared by:
<nixpkgs/nixos/modules/config/krb5.nix>
|
krb5.domainRealmDefault domain realm.
Type:
"unspecified"
Default:
"atena.mit.edu"
Declared by:
<nixpkgs/nixos/modules/config/krb5.nix>
|
krb5.enableWhether to enable Kerberos V.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/krb5.nix>
|
krb5.kdcKerberos Domain Controller.
Type:
"unspecified"
Default:
"kerberos.mit.edu"
Declared by:
<nixpkgs/nixos/modules/config/krb5.nix>
|
krb5.kerberosAdminServerKerberos Admin Server.
Type:
"unspecified"
Default:
"kerberos.mit.edu"
Declared by:
<nixpkgs/nixos/modules/config/krb5.nix>
|
libThis option allows modules to define helper functions, constants, etc.
Type:
"attribute set of attribute sets"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/misc/lib.nix>
|
nesting.childrenAdditional configurations to build.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/activation/top-level.nix>
|
nesting.cloneAdditional configurations to build based on the current configuration which then has a lower priority.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/activation/top-level.nix>
|
networking.WLANInterfaceObsolete. Use networking.wireless.interfaces instead.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix>
|
networking.bondsThis option allows you to define bond devices that aggregate multiple, underlying networking interfaces together. The value of this option is an attribute set. Each attribute specifies a bond, with the attribute name specifying the name of the bond's network interface
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
bond0 =
{
interfaces =
[
"eth0" "wlan0"
]
; miimon = 100; mode = "active-backup";
}
; fatpipe =
{
interfaces =
[
"enp4s0f0" "enp4s0f1" "enp5s0f0" "enp5s0f1"
]
;
}
;
}
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.bonds.<name>.interfacesThe interfaces to bond together
Type:
"list of strings"
Example:
[
"enp4s0f0" "enp4s0f1" "wlan0"
]
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.bonds.<name>.lacp_rateOption specifying the rate in which we'll ask our link partner to transmit LACPDU packets in 802.3ad mode.
Type:
"null or string"
Default:
null
Example:
"fast"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.bonds.<name>.miimonMiimon is the number of millisecond in between each round of polling by the device driver for failed links. By default polling is not enabled and the driver is trusted to properly detect and handle failure scenarios.
Type:
"null or integer"
Default:
null
Example:
100
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.bonds.<name>.modeThe mode which the bond will be running. The default mode for the bonding driver is balance-rr, optimizing for throughput. More information about valid modes can be found at https://www.kernel.org/doc/Documentation/networking/bonding.txt
Type:
"null or string"
Default:
null
Example:
"active-backup"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.bonds.<name>.xmit_hash_policySelects the transmit hash policy to use for slave selection in balance-xor, 802.3ad, and tlb modes.
Type:
"null or string"
Default:
null
Example:
"layer2+3"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.bridgesThis option allows you to define Ethernet bridge devices that connect physical networks together. The value of this option is an attribute set. Each attribute specifies a bridge, with the attribute name specifying the name of the bridge's network interface.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
br0 =
{
interfaces =
[
"eth0" "eth1"
]
;
}
; br1 =
{
interfaces =
[
"eth2" "wlan0"
]
;
}
;
}
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.bridges.<name>.interfacesThe physical network interfaces connected by the bridge.
Type:
"list of strings"
Example:
[
"eth0" "eth1"
]
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.bridges.<name>.rstpWhether the bridge interface should enable rstp.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.connman.enableWhether to use ConnMan for managing your network connections.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/connman.nix>
|
networking.defaultGatewayThe default gateway. It can be left empty if it is auto-detected through DHCP.
Type:
"null or string"
Default:
null
Example:
"131.211.84.1"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.defaultGateway6The default ipv6 gateway. It can be left empty if it is auto-detected through DHCP.
Type:
"null or string"
Default:
null
Example:
"2001:4d0:1e04:895::1"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.defaultGatewayWindowSizeThe window size of the default gateway. It limits maximal data bursts that TCP peers are allowed to send to us.
Type:
"null or integer"
Default:
null
Example:
524288
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.defaultMailServer.authPassPassword used for SMTP auth. (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
Type:
"string"
Default:
""
Example:
"correctHorseBatteryStaple"
Declared by:
<nixpkgs/nixos/modules/programs/ssmtp.nix>
|
networking.defaultMailServer.authUserUsername used for SMTP auth. Leave blank to disable.
Type:
"string"
Default:
""
Example:
"foo@example.org"
Declared by:
<nixpkgs/nixos/modules/programs/ssmtp.nix>
|
networking.defaultMailServer.directDeliveryUse the trivial Mail Transfer Agent (MTA)
ssmtp package to allow programs to send
e-mail. If you don't want to run a “real” MTA like
sendmail or postfix on
your machine, set this option to true, and
set the option
networking.defaultMailServer.hostName to the
host name of your preferred mail server.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/programs/ssmtp.nix>
|
networking.defaultMailServer.domainThe domain from which mail will appear to be sent.
Type:
"string"
Default:
""
Example:
"example.org"
Declared by:
<nixpkgs/nixos/modules/programs/ssmtp.nix>
|
networking.defaultMailServer.hostNameThe host name of the default mail server to use to deliver e-mail.
Type:
"string"
Example:
"mail.example.org"
Declared by:
<nixpkgs/nixos/modules/programs/ssmtp.nix>
|
networking.defaultMailServer.rootThe e-mail to which mail for users with UID < 1000 is forwarded.
Type:
"string"
Default:
""
Example:
"root@example.org"
Declared by:
<nixpkgs/nixos/modules/programs/ssmtp.nix>
|
networking.defaultMailServer.useSTARTTLSWhether the STARTTLS should be used to connect to the default mail server. (This is needed for TLS-capable mail servers running on the default SMTP port 25.)
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/programs/ssmtp.nix>
|
networking.defaultMailServer.useTLSWhether TLS should be used to connect to the default mail server.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/programs/ssmtp.nix>
|
networking.dhcpcd.allowInterfacesEnable the DHCP client for any interface whose name matches any of the shell glob patterns in this list. Any interface not explicitly matched by this pattern will be denied. This pattern only applies when non-null.
Type:
"null or list of strings"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpcd.nix>
|
networking.dhcpcd.denyInterfacesDisable the DHCP client for any interface whose name matches any of the shell glob patterns in this list. The purpose of this option is to blacklist virtual interfaces such as those created by Xen, libvirt, LXC, etc.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpcd.nix>
|
networking.dhcpcd.extraConfigLiteral string to append to the config file generated for dhcpcd.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpcd.nix>
|
networking.dhcpcd.persistentWhenever to leave interfaces configured on dhcpcd daemon shutdown. Set to true if you have your root or store mounted over the network or this machine accepts SSH connections through DHCP interfaces and clients should be notified when it shuts down.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpcd.nix>
|
networking.dhcpcd.runHookShell code that will be run after all other hooks. See `man dhcpcd-run-hooks` for details on what is possible.
Type:
"string"
Default:
""
Example:
"if [[ \$reason =~ BOUND ]]; then echo \$interface: Routers are \$new_routers - were \$old_routers; fi"
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpcd.nix>
|
networking.dnsSingleRequestRecent versions of glibc will issue both ipv4 (A) and ipv6 (AAAA) address queries at the same time, from the same port. Sometimes upstream routers will systemically drop the ipv4 queries. The symptom of this problem is that 'getent hosts example.com' only returns ipv6 (or perhaps only ipv4) addresses. The workaround for this is to specify the option 'single-request' in /etc/resolv.conf. This option enables that.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/networking.nix>
|
networking.domainThe domain. It can be left empty if it is auto-detected through DHCP.
Type:
"null or string"
Default:
null
Example:
"home"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.enableB43FirmwareTurn on this option if you want firmware for the NICs supported by the b43 module.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/network/b43.nix>
|
networking.enableIPv6Whether to enable support for IPv6.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.enableIntel2100BGFirmwareTurn on this option if you want firmware for the Intel PRO/Wireless 2100BG to be loaded automatically. This is required if you want to use this device.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/network/intel-2100bg.nix>
|
networking.enableIntel2200BGFirmwareTurn on this option if you want firmware for the Intel PRO/Wireless 2200BG to be loaded automatically. This is required if you want to use this device.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/network/intel-2200bg.nix>
|
networking.enableIntel3945ABGFirmwareThis option enables automatic loading of the firmware for the Intel PRO/Wireless 3945ABG.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/network/intel-3945abg.nix>
|
networking.enableRTL8192cFirmwareTurn on this option if you want firmware for the RTL8192c (and related) NICs.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/network/rtl8192c.nix>
|
networking.enableRalinkFirmwareTurn on this option if you want firmware for the RT73 NIC.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/hardware/network/ralink.nix>
|
networking.extraHostsAdditional entries to be appended to /etc/hosts.
Type:
"string"
Default:
""
Example:
"192.168.0.1 lanlocalhost"
Declared by:
<nixpkgs/nixos/modules/config/networking.nix>
|
networking.firewall.allowPingWhether to respond to incoming ICMPv4 echo requests ("pings"). ICMPv6 pings are always allowed because the larger address space of IPv6 makes network scanning much less effective.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.allowedTCPPortRangesA range of TCP ports on which incoming connections are accepted.
Type:
"list of attribute set of integerss"
Default:
[
]
Example:
[
{
from = 8999; to = 9003;
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.allowedTCPPortsList of TCP ports on which incoming connections are accepted.
Type:
"list of integers"
Default:
[
]
Example:
[
22 80
]
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.allowedUDPPortRangesRange of open UDP ports.
Type:
"list of attribute set of integerss"
Default:
[
]
Example:
[
{
from = 60000; to = 61000;
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.allowedUDPPortsList of open UDP ports.
Type:
"list of integers"
Default:
[
]
Example:
[
53
]
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.autoLoadConntrackHelpersWhether to auto-load connection-tracking helpers. See the description at networking.firewall.connectionTrackingModules (needs kernel 3.5+)
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.checkReversePathPerforms a reverse path filter test on a packet. If a reply to the packet would not be sent via the same interface that the packet arrived on, it is refused. If using asymmetric routing or other complicated routing, disable this setting and setup your own counter-measures. (needs kernel 3.3+)
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.connectionTrackingModulesList of connection-tracking helpers that are auto-loaded. The complete list of possible values is given in the example. As helpers can pose as a security risk, it is advised to set this to an empty list and disable the setting networking.firewall.autoLoadConntrackHelpers Loading of helpers is recommended to be done through the new CT target. More info: https://home.regit.org/netfilter-en/secure-use-of-helpers/
Type:
"list of strings"
Default:
[
"ftp"
]
Example:
[
"ftp" "irc" "sane" "sip" "tftp" "amanda" "h323" "netbios_sn" "pptp" "snmp"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.enableWhether to enable the firewall. This is a simple stateful firewall that blocks connection attempts to unauthorised TCP or UDP ports on this machine. It does not affect packet forwarding.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.extraCommandsAdditional shell commands executed as part of the firewall initialisation script. These are executed just before the final "reject" firewall rule is added, so they can be used to allow packets that would otherwise be refused.
Type:
"string"
Default:
""
Example:
"iptables -A INPUT -p icmp -j ACCEPT"
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.extraStopCommandsAdditional shell commands executed as part of the firewall shutdown script. These are executed just after the removal of the nixos input rule, or if the service enters a failed state.
Type:
"string"
Default:
""
Example:
"iptables -P INPUT ACCEPT"
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.logRefusedConnectionsWhether to log rejected or dropped incoming connections.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.logRefusedPacketsWhether to log all rejected or dropped incoming packets. This tends to give a lot of log messages, so it's mostly useful for debugging.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.logRefusedUnicastsOnlyIf networking.firewall.logRefusedPackets
and this option are enabled, then only log packets
specifically directed at this machine, i.e., not broadcasts
or multicasts.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.pingLimitIf pings are allowed, this allows setting rate limits on them. If non-null, this option should be in the form of flags like "--limit 1/minute --limit-burst 5"
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.rejectPacketsIf set, forbidden packets are rejected rather than dropped (ignored). This means that an ICMP "port unreachable" error message is sent back to the client. Rejecting packets makes port scanning somewhat easier.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.firewall.trustedInterfacesTraffic coming in from these interfaces will be accepted unconditionally.
Type:
"list of strings"
Declared by:
<nixpkgs/nixos/modules/services/networking/firewall.nix>
|
networking.hostIdThe 32-bit host ID of the machine, formatted as 8 hexadecimal characters.
You should try to make this ID unique among your machines. You can
generate a random 32-bit ID using the following commands:
cksum /etc/machine-id | while read c rest; do printf "%x" $c; done
(this derives it from the machine-id that systemd generates) or
head -c4 /dev/urandom | od -A none -t x4
Type:
"null or string"
Default:
null
Example:
"4e98920d"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.hostNameThe name of the machine. Leave it empty if you want to obtain it from a DHCP server (if using DHCP).
Type:
"string"
Default:
"nixos"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaceMonitor.beepIf true, beep when an Ethernet cable is
plugged in or unplugged.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ifplugd.nix>
|
networking.interfaceMonitor.commandsShell commands to be executed when the link status of an
interface changes. On invocation, the shell variable
iface contains the name of the interface,
while the variable status contains either
up or down to indicate
the new status.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/ifplugd.nix>
|
networking.interfaceMonitor.enableIf true, monitor Ethernet interfaces for
cables being plugged in or unplugged. When this occurs, the
commands specified in
networking.interfaceMonitor.commands are
executed.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ifplugd.nix>
|
networking.interfacesThe configuration for each network interface. If
networking.useDHCP is true, then every
interface not listed here will be configured using DHCP.
Type:
"list or attribute set of submodules"
Default:
{
}
Example:
{
eth0 =
{
ip4 =
[
{
address = "131.211.84.78"; prefixLength = 25;
}
]
;
}
;
}
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ip4List of IPv4 addresses that will be statically assigned to the interface.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
address = "10.0.0.1"; prefixLength = 16;
}
{
address = "192.168.1.1"; prefixLength = 24;
}
]
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ip4.*.addressIPv4 address of the interface. Leave empty to configure the interface using DHCP.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ip4.*.prefixLengthSubnet mask of the interface, specified as the number of
bits in the prefix (24).
Type:
"integer"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ip6List of IPv6 addresses that will be statically assigned to the interface.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
address = "fdfd:b3f0:482::1"; prefixLength = 48;
}
{
address = "2001:1470:fffd:2098::e006"; prefixLength = 64;
}
]
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ip6.*.addressIPv6 address of the interface. Leave empty to configure the interface using DHCP.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ip6.*.prefixLengthSubnet mask of the interface, specified as the number of
bits in the prefix (64).
Type:
"integer"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ipAddressIP address of the interface. Leave empty to configure the interface using DHCP.
Type:
"null or string"
Default:
null
Example:
"10.0.0.1"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ipv6AddressIPv6 address of the interface. Leave empty to configure the interface using NDP.
Type:
"null or string"
Default:
null
Example:
"2001:1470:fffd:2098::e006"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.ipv6PrefixLengthSubnet mask of the interface, specified as the number of
bits in the prefix (64).
Type:
"integer"
Default:
64
Example:
64
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.macAddressMAC address of the interface. Leave empty to use the default.
Type:
"null or string"
Default:
null
Example:
"00:11:22:33:44:55"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.mtuMTU size for packets leaving the interface. Leave empty to use the default.
Type:
"null or integer"
Default:
null
Example:
9000
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.nameName of the interface.
Type:
"string"
Example:
"eth0"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.prefixLengthSubnet mask of the interface, specified as the number of
bits in the prefix (24).
Type:
"null or integer"
Default:
null
Example:
24
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.proxyARPTurn on proxy_arp for this device (and proxy_ndp for ipv6). This is mainly useful for creating pseudo-bridges between a real interface and a virtual network such as VPN or a virtual machine for interfaces that don't support real bridging (most wlan interfaces). As ARP proxying acts slightly above the link-layer, below-ip traffic isn't bridged, so things like DHCP won't work. The advantage above using NAT lies in the fact that no IP addresses are shared, so all hosts are reachable/routeable. WARNING: turns on ip-routing, so if you have multiple interfaces, you should think of the consequence and setup firewall rules to limit this.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.subnetMaskDefunct, supply the prefix length instead.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.useDHCPWhether this interface should be configured with dhcp. Null implies the old behavior which depends on whether ip addresses are specified or not.
Type:
"null or boolean"
Default:
null
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.virtualWhether this interface is virtual and should be created by tunctl. This is mainly useful for creating bridges between a host a virtual network such as VPN or a virtual machine.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.virtualOwnerIn case of a virtual device, the user who owns it.
Type:
"string"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.interfaces.<name?>.virtualTypeThe explicit type of interface to create. Accepts tun or tap strings. Also accepts null to implicitly detect the type of device.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.localCommandsShell commands to be executed at the end of the
network-setup systemd service. Note that if
you are using DHCP to obtain the network configuration,
interfaces may not be fully configured yet.
Type:
"unspecified"
Default:
""
Example:
"text=anything; echo You can put \$text here."
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.macvlansThis option allows you to define macvlan interfaces which should be automatically created.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
wan =
{
interface = "enp2s0"; mode = "vepa";
}
;
}
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.macvlans.<name>.interfaceThe interface the macvlan will transmit packets through.
Type:
"string"
Example:
"enp4s0"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.macvlans.<name>.modeThe mode of the macvlan device.
Type:
"null or string"
Default:
null
Example:
"vepa"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.nameserversThe list of nameservers. It can be left empty if it is auto-detected through DHCP.
Type:
"unspecified"
Default:
[
]
Example:
[
"130.161.158.4" "130.161.33.17"
]
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.nat.enableWhether to enable Network Address Translation (NAT).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nat.nix>
|
networking.nat.externalIPThe public IP address to which packets from the local network are to be rewritten. If this is left empty, the IP address associated with the external interface will be used.
Type:
"null or string"
Default:
null
Example:
"203.0.113.123"
Declared by:
<nixpkgs/nixos/modules/services/networking/nat.nix>
|
networking.nat.externalInterfaceThe name of the external network interface.
Type:
"string"
Example:
"eth1"
Declared by:
<nixpkgs/nixos/modules/services/networking/nat.nix>
|
networking.nat.forwardPortsList of forwarded ports from the external interface to internal destinations by using DNAT.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
destination = "10.0.0.1:80"; sourcePort = 8080;
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nat.nix>
|
networking.nat.forwardPorts.*.destinationForward tcp connection to destination ip:port
Type:
"string"
Example:
"10.0.0.1:80"
Declared by:
<nixpkgs/nixos/modules/services/networking/nat.nix>
|
networking.nat.forwardPorts.*.sourcePortSource port of the external interface
Type:
"integer"
Example:
8080
Declared by:
<nixpkgs/nixos/modules/services/networking/nat.nix>
|
networking.nat.internalIPsThe IP address ranges for which to perform NAT. Packets coming from these addresses (on any interface) and destined for the external interface will be rewritten.
Type:
"list of strings"
Default:
[
]
Example:
[
"192.168.1.0/24"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nat.nix>
|
networking.nat.internalInterfacesThe interfaces for which to perform NAT. Packets coming from these interface and destined for the external interface will be rewritten.
Type:
"list of strings"
Default:
[
]
Example:
[
"eth0"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nat.nix>
|
networking.networkmanager.appendNameserversA list of name servers that should be appended to the ones configured in NetworkManager or received by DHCP.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/networkmanager.nix>
|
networking.networkmanager.dispatcherScriptsA list of scripts which will be executed in response to network events.
Type:
"list of submodules"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/networkmanager.nix>
|
networking.networkmanager.dispatcherScripts.*.sourceA script source.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/networkmanager.nix>
|
networking.networkmanager.dispatcherScripts.*.typeDispatcher hook type. Only basic hooks are currently available.
Type:
"one of basic"
Default:
"basic"
Declared by:
<nixpkgs/nixos/modules/services/networking/networkmanager.nix>
|
networking.networkmanager.enableWhether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured. If enabled, a group networkmanager
will be created. Add all users that should have permission
to change network settings to this group.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/networkmanager.nix>
|
networking.networkmanager.insertNameserversA list of name servers that should be inserted before the ones configured in NetworkManager or received by DHCP.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/networkmanager.nix>
|
networking.networkmanager.packagesExtra packages that provide NetworkManager plugins.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/networkmanager.nix>
|
networking.proxy.defaultThis option specifies the default value for httpProxy, httpsProxy, ftpProxy and rsyncProxy.
Type:
"null or string"
Default:
null
Example:
"http://127.0.0.1:3128"
Declared by:
<nixpkgs/nixos/modules/config/networking.nix>
|
networking.proxy.ftpProxyThis option specifies the ftp_proxy environment variable.
Type:
"null or string"
Default:
null
Example:
"http://127.0.0.1:3128"
Declared by:
<nixpkgs/nixos/modules/config/networking.nix>
|
networking.proxy.httpProxyThis option specifies the http_proxy environment variable.
Type:
"null or string"
Default:
null
Example:
"http://127.0.0.1:3128"
Declared by:
<nixpkgs/nixos/modules/config/networking.nix>
|
networking.proxy.httpsProxyThis option specifies the https_proxy environment variable.
Type:
"null or string"
Default:
null
Example:
"http://127.0.0.1:3128"
Declared by:
<nixpkgs/nixos/modules/config/networking.nix>
|
networking.proxy.noProxyThis option specifies the no_proxy environment variable. If a default proxy is used and noProxy is null, then noProxy will be set to 127.0.0.1,localhost.
Type:
"null or string"
Default:
null
Example:
"127.0.0.1,localhost,.localdomain"
Declared by:
<nixpkgs/nixos/modules/config/networking.nix>
|
networking.proxy.rsyncProxyThis option specifies the rsync_proxy environment variable.
Type:
"null or string"
Default:
null
Example:
"http://127.0.0.1:3128"
Declared by:
<nixpkgs/nixos/modules/config/networking.nix>
|
networking.searchThe list of search paths used when resolving domain names.
Type:
"list of strings"
Default:
[
]
Example:
[
"example.com" "local.domain"
]
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.sitsThis option allows you to define 6-to-4 interfaces which should be automatically created.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
hurricane =
{
local = "10.0.0.22"; remote = "10.0.0.1"; ttl = 255;
}
; msipv6 =
{
dev = "enp3s0"; remote = "192.168.0.1"; ttl = 127;
}
;
}
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.sits.<name>.devThe underlying network device on which the tunnel resides.
Type:
"null or string"
Default:
null
Example:
"enp4s0f0"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.sits.<name>.localThe address of the local endpoint which the remote side should send packets to.
Type:
"null or string"
Default:
null
Example:
"10.0.0.22"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.sits.<name>.remoteThe address of the remote endpoint to forward traffic over.
Type:
"null or string"
Default:
null
Example:
"10.0.0.1"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.sits.<name>.ttlThe time-to-live of the connection to the remote tunnel endpoint.
Type:
"null or integer"
Default:
null
Example:
255
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.tcpcrypt.enableWhether to enable opportunistic TCP encryption. If the other end speaks Tcpcrypt, then your traffic will be encrypted; otherwise it will be sent in clear text. Thus, Tcpcrypt alone provides no guarantees -- it is best effort. If, however, a Tcpcrypt connection is successful and any attackers that exist are passive, then Tcpcrypt guarantees privacy.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/tcpcrypt.nix>
|
networking.useDHCPWhether to use DHCP to obtain an IP address and other configuration for all network interfaces that are not manually configured.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.useHostResolvConfIn containers, whether to use the
resolv.conf supplied by the host.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.useNetworkdWhether we should use networkd as the network configuration backend or the legacy script based system. Note that this option is experimental, enable at your own risk.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.usePredictableInterfaceNamesWhether to assign predictable
names to network interfaces. If enabled, interfaces
are assigned names that contain topology information
(e.g. wlp3s0) and thus should be stable
across reboots. If disabled, names depend on the order in
which interfaces are discovered by the kernel, which may
change randomly across reboots; for instance, you may find
eth0 and eth1 flipping
unpredictably.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/hardware/udev.nix>
|
networking.vlansThis option allows you to define vlan devices that tag packets on top of a physical interface. The value of this option is an attribute set. Each attribute specifies a vlan, with the name specifying the name of the vlan interface.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
vlan0 =
{
id = 3; interface = "enp3s0";
}
; vlan1 =
{
id = 1; interface = "wlan0";
}
;
}
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.vlans.<name>.idThe vlan identifier
Type:
"integer"
Example:
1
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.vlans.<name>.interfaceThe interface the vlan will transmit packets through.
Type:
"string"
Example:
"enp4s0"
Declared by:
<nixpkgs/nixos/modules/tasks/network-interfaces.nix>
|
networking.vpnc.servicesThe names of cisco VPNs and their associated definitions
Type:
"attribute set of strings"
Default:
{
}
Example:
{
test = "IPSec gateway 192.168.1.1 \nIPSec ID someID\nIPSec secret secretKey\nXauth username name\nXauth password pass\n";
}
Declared by:
<nixpkgs/nixos/modules/config/vpnc.nix>
|
networking.wicd.enableWhether to start wicd. Wired and wireless network configurations can then be managed by wicd-client.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/wicd.nix>
|
networking.wireless.driverForce a specific wpa_supplicant driver.
Type:
"string"
Default:
"nl80211,wext"
Declared by:
<nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix>
|
networking.wireless.enableWhether to start wpa_supplicant to scan for
and associate with wireless networks. Note: NixOS currently
does not manage wpa_supplicant's
configuration file, /etc/wpa_supplicant.conf. You
should edit this file yourself to define wireless networks,
WPA keys and so on (see
wpa_supplicant.conf(5)), or use
networking.wireless.userControlled.* to allow users to add entries
through wpa_cli and wpa_gui.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix>
|
networking.wireless.interfacesThe interfaces wpa_supplicant will use. If empty, it will automatically use all wireless interfaces.
Type:
"list of strings"
Default:
[
]
Example:
[
"wlan0" "wlan1"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix>
|
networking.wireless.userControlled.enableAllow normal users to control wpa_supplicant through wpa_gui or wpa_cli. This is useful for laptop users that switch networks a lot and don't want to depend on a large package such as NetworkManager just to pick nearby access points. When you want to use this, make sure /etc/wpa_supplicant.conf doesn't exist. It will be created for you. Currently it is also necessary to explicitly specify networking.wireless.interfaces.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix>
|
networking.wireless.userControlled.groupMembers of this group can control wpa_supplicant.
Type:
"string"
Default:
"wheel"
Example:
"network"
Declared by:
<nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix>
|
nix.binaryCachePublicKeysList of public keys used to sign binary caches. If
nix.requireSignedBinaryCaches is enabled,
then Nix will use a binary from a binary cache if and only
if it is signed by any of the keys
listed here. By default, only the key for
cache.nixos.org is included.
Type:
"list of strings"
Example:
[
"hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs="
]
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.binaryCachesList of binary cache URLs used to obtain pre-built binaries of Nix packages.
Type:
"list of strings"
Default:
[
"https://cache.nixos.org/"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.buildCoresThis option defines the maximum number of concurrent tasks during one build. It affects, e.g., -j option for make. The default is 1. The special value 0 means that the builder should use all available CPU cores in the system. Some builds may become non-deterministic with this option; use with care! Packages will only be affected if enableParallelBuilding is set for them.
Type:
"integer"
Default:
1
Example:
64
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.buildMachinesThis option lists the machines to be used if distributed
builds are enabled (see
nix.distributedBuilds). Nix will perform
derivations on those machines via SSH by copying the inputs
to the Nix store on the remote machine, starting the build,
then copying the output back to the local Nix store. Each
element of the list should be an attribute set containing
the machine's host name (hostname), the
user name to be used for the SSH connection
(sshUser), the Nix system type
(system, e.g.,
"i686-linux"), the maximum number of
jobs to be run in parallel on that machine
(maxJobs), the path to the SSH private
key to be used to connect (sshKey), a
list of supported features of the machine
(supportedFeatures) and a list of
mandatory features of the machine
(mandatoryFeatures). The SSH private key
should not have a passphrase, and the corresponding public
key should be added to
~
on the remote machine.
sshUser/authorized_keys
Type:
"list of attribute sets"
Default:
[
]
Example:
[
{
hostName = "voila.labs.cs.uu.nl"; maxJobs = 1; sshKey = "/root/.ssh/id_buildfarm"; sshUser = "nix"; system = "powerpc-darwin";
}
{
hostName = "linux64.example.org"; mandatoryFeatures = "perf"; maxJobs = 2; sshKey = "/root/.ssh/id_buildfarm"; sshUser = "buildfarm"; supportedFeatures = "kvm"; system = "x86_64-linux";
}
]
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.chrootDirsDirectories from the host filesystem to be included in the chroot.
Type:
"list of strings"
Default:
[
]
Example:
[
"/dev" "/proc"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.daemonIONiceLevelNix daemon process I/O priority. This priority propagates to build processes. 0 is the default Unix process I/O priority, 7 is the lowest.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.daemonNiceLevelNix daemon process priority. This priority propagates to build processes. 0 is the default Unix process priority, 20 is the lowest.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.distributedBuildsWhether to distribute builds to the machines listed in
nix.buildMachines.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.extraOptionsAdditional text appended to nix.conf.
Type:
"string"
Default:
""
Example:
'' gc-keep-outputs = true gc-keep-derivations = true ''
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.gc.automaticAutomatically run the garbage collector at a specific time.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-gc.nix>
|
nix.gc.datesSpecification (in the format described by systemd.time(5)) of the time at which the garbage collector will run.
Type:
"string"
Default:
"03:15"
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-gc.nix>
|
nix.gc.optionsOptions given to nix-collect-garbage when the
garbage collector is run automatically.
Type:
"string"
Default:
""
Example:
"--max-freed \$((64 * 1024**3))"
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-gc.nix>
|
nix.maxJobsThis option defines the maximum number of jobs that Nix will try to build in parallel. The default is 1. You should generally set it to the number of CPUs in your system (e.g., 2 on an Athlon 64 X2).
Type:
"integer"
Default:
1
Example:
64
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.nrBuildUsersNumber of nixbld user accounts created to
perform secure concurrent builds. If you receive an error
message saying that “all build users are currently in use”,
you should increase this value.
Type:
"integer"
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.readOnlyStoreIf set, NixOS will enforce the immutability of the Nix store
by making /nix/store a read-only bind
mount. Nix will automatically make the store writable when
needed.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.requireSignedBinaryCachesIf enabled, Nix will only download binaries from binary
caches if they are cryptographically signed with any of the
keys listed in
nix.binaryCachePublicKeys. If disabled (the
default), signatures are neither required nor checked, so
it's strongly recommended that you use only trustworthy
caches and https to prevent man-in-the-middle attacks.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.sshServe.enableWhether to enable serving the Nix store as a binary cache via SSH.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-ssh-serve.nix>
|
nix.sshServe.keysA list of SSH public keys allowed to access the binary cache via SSH.
Type:
"list of strings"
Default:
[
]
Example:
[
"ssh-dss AAAAB3NzaC1k... alice@example.org"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-ssh-serve.nix>
|
nix.trustedBinaryCachesList of binary cache URLs that non-root users can use (in
addition to those specified using
nix.binaryCaches by passing
--option binary-caches to Nix commands.
Type:
"list of strings"
Default:
[
]
Example:
[
"http://hydra.nixos.org/"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nix.useChrootIf set, Nix will perform builds in a chroot-environment that it will set up automatically for each build. This prevents impurities in builds by disallowing access to dependencies outside of the Nix store.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/nix-daemon.nix>
|
nixpkgs.configThe configuration of the Nix Packages collection. (For
details, see the Nixpkgs documentation.) It allows you to set
package configuration options, and to override packages
globally through the packageOverrides
option. The latter is a function that takes as an argument
the original Nixpkgs, and must evaluate
to a set of new or overridden packages.
Type:
"nixpkgs config"
Default:
{
}
Example:
{ firefox.enableGeckoMediaPlayer = true;
packageOverrides = pkgs: {
firefox60Pkgs = pkgs.firefox60Pkgs.override {
enableOfficialBranding = true;
};
};
}
Declared by:
<nixpkgs/nixos/modules/misc/nixpkgs.nix>
|
nixpkgs.systemSpecifies the Nix platform type for which NixOS should be built. If unset, it defaults to the platform type of your host system. Specifying this option is useful when doing distributed multi-platform deployment, or when building virtual machines.
Type:
"string"
Example:
"i686-linux"
Declared by:
<nixpkgs/nixos/modules/misc/nixpkgs.nix>
|
power.ups.enableEnables support for Power Devices, such as Uninterruptible Power Supplies, Power Distribution Units and Solar Controllers.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.maxStartDelayThis can be set as a global variable above your first UPS definition and it can also be set in a UPS section. This value controls how long upsdrvctl will wait for the driver to finish starting. This keeps your system from getting stuck due to a broken driver or UPS.
Type:
"integer"
Default:
45
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.modeThe MODE determines which part of the NUT is to be started, and which configuration files must be modified. The values of MODE can be: - none: NUT is not configured, or use the Integrated Power Management, or use some external system to startup NUT components. So nothing is to be started. - standalone: This mode address a local only configuration, with 1 UPS protecting the local system. This implies to start the 3 NUT layers (driver, upsd and upsmon) and the matching configuration files. This mode can also address UPS redundancy. - netserver: same as for the standalone configuration, but also need some more ACLs and possibly a specific LISTEN directive in upsd.conf. Since this MODE is opened to the network, a special care should be applied to security concerns. - netclient: this mode only requires upsmon.
Type:
"string"
Default:
"standalone"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.schedulerRulesFile which contains the rules to handle UPS events.
Type:
"string"
Example:
"/etc/nixos/upssched.conf"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.upsThis is where you configure all the UPSes that this system will be monitoring directly. These are usually attached to serial ports, but USB devices are also supported.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.ups.<name>.descriptionDescription of the UPS.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.ups.<name>.directivesList of configuration directives for this UPS.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.ups.<name>.driverSpecify the program to run to talk to this UPS. apcsmart, bestups, and sec are some examples.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.ups.<name>.maxStartDelayThis can be set as a global variable above your first UPS definition and it can also be set in a UPS section. This value controls how long upsdrvctl will wait for the driver to finish starting. This keeps your system from getting stuck due to a broken driver or UPS.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.ups.<name>.portThe serial port to which your UPS is connected. /dev/ttyS0 is usually the first port on Linux boxes, for example.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.ups.<name>.shutdownOrderWhen you have multiple UPSes on your system, you usually need to turn them off in a certain order. upsdrvctl shuts down all the 0s, then the 1s, 2s, and so on. To exclude a UPS from the shutdown sequence, set this to -1.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
power.ups.ups.<name>.summaryLines which would be added inside ups.conf for handling this UPS.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/ups.nix>
|
powerManagement.cpuFreqGovernorConfigure the governor used to regulate the frequence of the available CPUs. By default, the kernel configures the on-demand governor.
Type:
"null or string"
Default:
null
Example:
"ondemand"
Declared by:
<nixpkgs/nixos/modules/tasks/cpu-freq.nix>
|
powerManagement.enableWhether to enable power management. This includes support for suspend-to-RAM and powersave features on laptops.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/power-management.nix>
|
powerManagement.powerDownCommandsCommands executed when the machine powers down. That is, they're executed both when the system shuts down and when it goes to suspend or hibernation.
Type:
"string"
Default:
""
Example:
"${pkgs.hdparm}/sbin/hdparm -B 255 /dev/sda"
Declared by:
<nixpkgs/nixos/modules/config/power-management.nix>
|
powerManagement.powerUpCommandsCommands executed when the machine powers up. That is, they're executed both when the system first boots and when it resumes from suspend or hibernation.
Type:
"string"
Default:
""
Example:
"${pkgs.hdparm}/sbin/hdparm -B 255 /dev/sda"
Declared by:
<nixpkgs/nixos/modules/config/power-management.nix>
|
powerManagement.resumeCommandsCommands executed after the system resumes from suspend-to-RAM.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/config/power-management.nix>
|
powerManagement.scsiLinkPolicyConfigure the SCSI link power management policy. By default, the kernel configures "max_performance".
Type:
"string"
Default:
""
Example:
"min_power"
Declared by:
<nixpkgs/nixos/modules/tasks/scsi-link-power-management.nix>
|
programs.atop.settingsParameters to be written to /etc/atoprc.
Type:
"attribute set"
Default:
{
}
Example:
{
flags = "a1f"; interval = 5;
}
Declared by:
<nixpkgs/nixos/modules/programs/atop.nix>
|
programs.bash.enableCompletionEnable Bash completion for all interactive bash shells.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/bash/bash.nix>
|
programs.bash.interactiveShellInitShell script code called during interactive bash shell initialisation.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/programs/bash/bash.nix>
|
programs.bash.loginShellInitShell script code called during login bash shell initialisation.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/programs/bash/bash.nix>
|
programs.bash.promptInitShell script code used to initialise the bash prompt.
Type:
"string"
Default:
'' # Provide a nice prompt. PROMPT_COLOR="1;31m" let $UID && PROMPT_COLOR="1;32m" PS1="\n\[\033[$PROMPT_COLOR\][\u@\h:\w]\\$\[\033[0m\] " if test "$TERM" = "xterm"; then PS1="\[\033]2;\h:\u:\w\007\]$PS1" fi ''
Declared by:
<nixpkgs/nixos/modules/programs/bash/bash.nix>
|
programs.bash.shellAliasesSet of aliases for bash shell. See environment.shellAliases
for an option format description.
Type:
"attribute set"
Default:
{
l = "ls -alh"; ll = "ls -l"; ls = "ls --color=tty"; restart = "systemctl restart"; start = "systemctl start"; status = "systemctl status"; stop = "systemctl stop"; which = "type -P";
}
Declared by:
<nixpkgs/nixos/modules/programs/bash/bash.nix>
|
programs.bash.shellInitShell script code called during bash shell initialisation.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/programs/bash/bash.nix>
|
programs.cdemu.enableWhether to enable cdemu for users of appropriate group (default cdrom)
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/cdemu.nix>
|
programs.cdemu.groupRequired group for users of cdemu
Type:
"unspecified"
Default:
"cdrom"
Declared by:
<nixpkgs/nixos/modules/programs/cdemu.nix>
|
programs.cdemu.guiWhether to install cdemu GUI (gCDEmu)
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/programs/cdemu.nix>
|
programs.cdemu.image-analyzerWhether to install image analyzer
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/programs/cdemu.nix>
|
programs.ibus.enableEnable IBus input method
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/programs/ibus.nix>
|
programs.ibus.pluginsIBus plugin packages
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/programs/ibus.nix>
|
programs.light.enableWhether to install Light backlight control with setuid wrapper.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/light.nix>
|
programs.nano.nanorcThe system-wide nano configuration. See nanorc(5).
Type:
"string"
Default:
""
Example:
'' set nowrap set tabstospaces set tabsize 4 ''
Declared by:
<nixpkgs/nixos/modules/programs/nano.nix>
|
programs.screen.screenrcThe contents of /etc/screenrc file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/programs/screen.nix>
|
programs.ssh.agentTimeoutHow long to keep the private keys in memory. Use null to keep them forever.
Type:
"null or string"
Default:
null
Example:
"1h"
Declared by:
<nixpkgs/nixos/modules/programs/ssh.nix>
|
programs.ssh.askPasswordProgram used by SSH to ask for passwords.
Type:
"string"
Default:
"/nix/store/dsi5p2v34y8rqj957yj5vpgw43sbf818-x11-ssh-askpass-1.2.4.1/libexec/x11-ssh-askpass"
Declared by:
<nixpkgs/nixos/modules/programs/ssh.nix>
|
programs.ssh.extraConfigExtra configuration text appended to ssh_config.
See ssh_config(5)
for help.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/programs/ssh.nix>
|
programs.ssh.forwardX11Whether to request X11 forwarding on outgoing connections by default. This is useful for running graphical programs on the remote machine and have them display to your local X11 server. Historically, this value has depended on the value used by the local sshd daemon, but there really isn't a relation between the two. Note: there are some security risks to forwarding an X11 connection. NixOS's X server is built with the SECURITY extension, which prevents some obvious attacks. To enable or disable forwarding on a per-connection basis, see the -X and -x options to ssh. The -Y option to ssh enables trusted forwarding, which bypasses the SECURITY extension.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/ssh.nix>
|
programs.ssh.packageThe package used for the openssh client and daemon.
Type:
"unspecified"
Default:
(build of openssh-6.8p1)
Declared by:
<nixpkgs/nixos/modules/programs/ssh.nix>
|
programs.ssh.setXAuthLocationWhether to set the path to xauth for X11-forwarded connections. This causes a dependency on X11 packages.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/ssh.nix>
|
programs.ssh.startAgentWhether to start the OpenSSH agent when you log in. The OpenSSH agent remembers private keys for you so that you don't have to type in passphrases every time you make an SSH connection. Use ssh-add to add a key to the agent.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/programs/ssh.nix>
|
programs.zsh.enableWhenever to configure Zsh as an interactive shell.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/zsh/zsh.nix>
|
programs.zsh.interactiveShellInitShell script code called during interactive zsh shell initialisation.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/programs/zsh/zsh.nix>
|
programs.zsh.loginShellInitShell script code called during zsh login shell initialisation.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/programs/zsh/zsh.nix>
|
programs.zsh.promptInitShell script code used to initialise the zsh prompt.
Type:
"string"
Default:
'' autoload -U promptinit && promptinit && prompt walters ''
Declared by:
<nixpkgs/nixos/modules/programs/zsh/zsh.nix>
|
programs.zsh.shellAliasesSet of aliases for zsh shell. See environment.shellAliases
for an option format description.
Type:
"attribute set"
Default:
{
l = "ls -alh"; ll = "ls -l"; ls = "ls --color=tty"; restart = "systemctl restart"; start = "systemctl start"; status = "systemctl status"; stop = "systemctl stop";
}
Declared by:
<nixpkgs/nixos/modules/programs/zsh/zsh.nix>
|
programs.zsh.shellInitShell script code called during zsh shell initialisation.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/programs/zsh/zsh.nix>
|
qtPluginsPlugin packages for Qt such as input methods.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/config/qt-plugin-env.nix>
|
security.apparmor.confineSUIDApplicationsInstall AppArmor profiles for commonly-used SUID application to mitigate potential privilege escalation attacks due to bugs in such applications. Currently available profiles: ping
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/security/apparmor-suid.nix>
|
security.apparmor.enableEnable the AppArmor Mandatory Access Control system.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/apparmor.nix>
|
security.apparmor.profilesList of files containing AppArmor profiles.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/security/apparmor.nix>
|
security.duosec.acceptEnvFactorLook for factor selection or passcode in the
$DUO_PASSCODE environment variable before
prompting the user for input.
When $DUO_PASSCODE is non-empty, it will override
autopush. The SSH client will need SendEnv DUO_PASSCODE in
its configuration, and the SSH server will similarly need
AcceptEnv DUO_PASSCODE.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.allowTcpForwardingBy default, when SSH forwarding, enabling Duo Security will disable TCP forwarding. By enabling this, you potentially undermine some of the SSH based login security. Note this is not needed if you use PAM.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.autopushIf true, Duo Unix will automatically send
a push login request to the user’s phone, falling back on a
phone call if push is unavailable. If
false, the user will be prompted to
choose an authentication method. When configured with
autopush = yes, we recommend setting
prompts = 1.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.failmodeOn service or configuration errors that prevent Duo authentication, fail "safe" (allow access) or "secure" (deny access). The default is "safe".
Type:
"string"
Default:
"safe"
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.fallbackLocalIPDuo Unix reports the IP address of the authorizing user, for
the purposes of authorization and whitelisting. If Duo Unix
cannot detect the IP address of the client, setting
fallbackLocalIP = yes will cause Duo Unix
to send the IP address of the server it is running on.
If you are using IP whitelisting, enabling this option could
cause unauthorized logins if the local IP is listed in the
whitelist.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.groupUse Duo authentication for users only in this group.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.hostDuo API hostname.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.ikeyIntegration key.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.motdPrint the contents of /etc/motd to screen
after a successful login.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.pam.enableIf enabled, protect logins with Duo Security using PAM support.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.promptsIf a user fails to authenticate with a second factor, Duo
Unix will prompt the user to authenticate again. This option
sets the maximum number of prompts that Duo Unix will
display before denying access. Must be 1, 2, or 3. Default
is 3.
For example, when prompts = 1, the user
will have to successfully authenticate on the first prompt,
whereas if prompts = 2, if the user
enters incorrect information at the initial prompt, he/she
will be prompted to authenticate again.
When configured with autopush = true, we
recommend setting prompts = 1.
Type:
"integer"
Default:
3
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.pushinfoInclude information such as the command to be executed in the Duo Push message.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.skeySecret key.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.duosec.ssh.enableIf enabled, protect SSH logins with Duo Security.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/duosec.nix>
|
security.grsecurity.config.denyChrootChmodIf true, then set GRKERN_CHROOT_CHMOD
y. If enabled, this denies processes inside a
chroot from setting the suid or sgid bits using
chmod or fchmod.
By default this protection is disabled - it makes it
impossible to use Nix to build software on your system,
which is what most users want.
If you are using NixOps to deploy your software to a
remote machine, you're encouraged to enable this as you
won't need to compile code.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.denyUSBIf true, then set GRKERNSEC_DENYUSB y.
This enables a sysctl with name
kernel.grsecurity.deny_new_usb. Setting
its value to 1 will prevent any new USB
devices from being recognized by the OS. Any attempted
USB device insertion will be logged.
This option is intended to be used against custom USB
devices designed to exploit vulnerabilities in various USB
device drivers.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.disableRBACIf true, then set GRKERN_NO_RBAC
y. This disables the
/dev/grsec device, which in turn
disables the RBAC system (and gradm).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.hardwareVirtualisationgrsecurity hardware virtualisation configuration. Set to
true if your machine supports hardware
accelerated virtualisation.
Type:
"null or boolean"
Default:
null
Example:
true
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.kernelExtraConfigExtra kernel configuration parameters.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.modegrsecurity configuration mode. This specifies whether grsecurity is auto-configured or otherwise completely manually configured.
Type:
"one of auto, custom"
Default:
"auto"
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.prioritygrsecurity configuration priority. This specifies whether the kernel configuration should emphasize speed or security.
Type:
"one of security, performance"
Default:
"security"
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.restrictProcIf true, then set GRKERN_PROC_USER
y. This restricts non-root users to only viewing
their own processes and restricts network-related
information, kernel symbols, and module information.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.restrictProcWithGroupIf true, then set GRKERN_PROC_USERGROUP
y. This is similar to
restrictProc except it allows a special
group (specified by unrestrictProcGid)
to still access otherwise classified information in
/proc.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.sysctlIf true, then set GRKERN_SYSCTL y. If
enabled then grsecurity can be controlled using sysctl
(and turned off). You are advised to *never* enable this,
but if you do, make sure to always set the sysctl
kernel.grsecurity.grsec_lock to
non-zero as soon as all sysctl options are set. *THIS IS
EXTREMELY IMPORTANT*!
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.systemgrsecurity system configuration.
Type:
"one of desktop, server"
Default:
"desktop"
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.unrestrictProcGidIf set, specifies a GID which is exempt from
/proc restrictions (set by
GRKERN_PROC_USERGROUP). By default,
this is set to the GID for grsecurity,
a predefined NixOS group, which the
root account is a member of. You may
conveniently add other users to this group if you need
access to /proc
Type:
"integer"
Default:
121
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.verboseVersionUse verbose version in kernel localversion.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.virtualisationConfiggrsecurity virtualisation configuration. This specifies the virtualisation role of the machine - that is, whether it will be a virtual machine guest, a virtual machine host, or neither.
Type:
"null or one of host, guest"
Default:
null
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.config.virtualisationSoftwareConfigure grsecurity for use with this virtualisation software.
Type:
"null or one of kvm, xen, vmware, virtualbox"
Default:
null
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.enableEnable grsecurity support. This enables advanced exploit
hardening for the Linux kernel, and adds support for
administrative Role-Based Acess Control (RBAC) via
gradm. It also includes traditional
utilities for PaX.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.stableEnable the stable grsecurity patch, based on Linux 3.14.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.grsecurity.testingEnable the testing grsecurity patch, based on Linux 3.19.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/grsecurity.nix>
|
security.pam.enableEcryptfsEnable eCryptfs PAM module (mounting ecryptfs home directory on login).
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.enableOATHEnable the OATH (one-time password) PAM module.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.enableOTPWEnable the OTPW (one-time password) PAM module.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.enableSSHAgentAuthEnable sudo logins if the user's SSH agent provides a key
present in ~/.ssh/authorized_keys.
This allows machines to exclusively use SSH keys instead of
passwords.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.loginLimitsDefine resource limits that should apply to users or groups.
Each item in the list should be an attribute set with a
domain, type,
item, and value
attribute. The syntax and semantics of these attributes
must be that described in the limits.conf(5) man page.
Type:
"unspecified"
Default:
[
]
Example:
[
{
domain = "ftp"; item = "nproc"; type = "hard"; value = "0";
}
{
domain = "@student"; item = "maxlogins"; type = "-"; value = "4";
}
]
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.servicesThis option defines the PAM services. A service typically corresponds to a program that uses PAM, e.g. login or passwd. Each attribute of this set defines a PAM service, with the attribute name defining the name of the service.
Type:
"list or attribute set of submodules"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.allowNullPasswordWhether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group). This does not enable
logging into disabled accounts (i.e., that have the password
field set to !). Note that regardless of
what the pam_unix documentation says, accounts with hashed
empty passwords are always allowed to log in.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.forwardXAuthWhether X authentication keys should be passed from the calling user to the target user (e.g. for su)
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.fprintAuthIf set, fingerprint reader will be used (if exists and your fingerprints are enrolled).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.limitsAttribute set describing resource limits. Defaults to the
value of security.pam.loginLimits.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.logFailuresWhether to log authentication failures in /var/log/faillog.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.makeHomeDirWhether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.nameName of the PAM service.
Type:
"string"
Example:
"sshd"
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.oathAuthIf set, the OATH Toolkit will be used.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.otpwAuthIf set, the OTPW system will be used (if
~/.otpw exists).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.requireWheelWhether to permit root access only to members of group wheel.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.rootOKIf set, root doesn't need to authenticate (e.g. for the useradd service).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.setLoginUidSet the login uid of the process
(/proc/self/loginuid) for auditing
purposes. The login uid is only set by ‘entry points’ like
login and sshd, not by
commands like sudo.
Type:
"boolean"
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.showMotdWhether to show the message of the day.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.sshAgentAuthIf set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys. This is useful
for sudo on password-less remote systems.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.startSessionIf set, the service will register a new session with systemd's login manager. For local sessions, this will give the user access to audio devices, CD-ROM drives. In the default PolicyKit configuration, it also allows the user to reboot the system.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.textContents of the PAM service file.
Type:
"null or string"
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.unixAuthWhether users can log in with passwords defined in
/etc/shadow.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.updateWtmpWhether to update /var/log/wtmp.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.services.<name?>.usbAuthIf set, users listed in
/etc/pamusb.conf are able to log in
with the associated USB key.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
security.pam.usb.enableEnable USB login for all login systems that support it. For more information, visit http://pamusb.org/doc/quickstart#setting_up.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/pam_usb.nix>
|
security.pki.certificateFilesA list of files containing trusted root certificates in PEM
format. These are concatenated to form
/etc/ssl/certs/ca-bundle.crt, which is
used by many programs that use OpenSSL, such as
curl and git.
Type:
"list of paths"
Default:
[
]
Example:
[ "${pkgs.cacert}/etc/ca-bundle.crt" ]Declared by:
<nixpkgs/nixos/modules/security/ca.nix>
|
security.pki.certificatesA list of trusted root certificates in PEM format.
Type:
"list of strings"
Default:
[
]
Example:
[
"NixOS.org\n=========\n-----BEGIN CERTIFICATE-----\nMIIGUDCCBTigAwIBAgIDD8KWMA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJ\nTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0\n...\n-----END CERTIFICATE-----\n"
]
Declared by:
<nixpkgs/nixos/modules/security/ca.nix>
|
security.polkit.adminIdentitiesSpecifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value). By default, this is the root
user and all users in the wheel group.
Type:
"list of strings"
Default:
[
"unix-user:0" "unix-group:wheel"
]
Example:
[
"unix-user:alice" "unix-group:admin"
]
Declared by:
<nixpkgs/nixos/modules/security/polkit.nix>
|
security.polkit.enableWhether to enable PolKit.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/security/polkit.nix>
|
security.polkit.extraConfigAny polkit rules to be added to config (in JavaScript ;-). See: http://www.freedesktop.org/software/polkit/docs/latest/polkit.8.html#polkit-rules
Type:
"string"
Default:
""
Example:
''
/* Log authorization checks. */
polkit.addRule(function(action, subject) {
polkit.log("user " + subject.user + " is attempting action " + action.id + " from PID " + subject.pid);
});
/* Allow any local user to do anything (dangerous!). */
polkit.addRule(function(action, subject) {
if (subject.local) return "yes";
});
''Declared by:
<nixpkgs/nixos/modules/security/polkit.nix>
|
security.rngd.enableWhether to enable the rng daemon, which adds entropy from hardware sources of randomness to the kernel entropy pool when available.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/security/rngd.nix>
|
security.rtkit.enableWhether to enable the RealtimeKit system service, which hands out realtime scheduling priority to user processes on demand. For example, the PulseAudio server uses this to acquire realtime priority.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/rtkit.nix>
|
security.setuidOwnersThis option allows the ownership and permissions on the setuid wrappers for specific programs to be overridden from the default (setuid root, but not setgid root).
Type:
"list of attribute sets"
Default:
[
]
Example:
[
{
group = "postdrop"; owner = "nobody"; permissions = "u+rx,g+x,o+x"; program = "sendmail"; setgid = true; setuid = false;
}
]
Declared by:
<nixpkgs/nixos/modules/security/setuid-wrappers.nix>
|
security.setuidProgramsThe Nix store cannot contain setuid/setgid programs directly. For this reason, NixOS can automatically generate wrapper programs that have the necessary privileges. This option lists the names of programs in the system environment for which setuid root wrappers should be created.
Type:
"list of strings"
Default:
[
]
Example:
[
"passwd"
]
Declared by:
<nixpkgs/nixos/modules/security/setuid-wrappers.nix>
|
security.sudo.configFileThis string contains the contents of the
sudoers file.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/security/sudo.nix>
|
security.sudo.enableWhether to enable the sudo command, which allows non-root users to execute commands as root.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/security/sudo.nix>
|
security.sudo.extraConfigExtra configuration text appended to sudoers.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/security/sudo.nix>
|
security.sudo.wheelNeedsPasswordWhether users of the wheel group can execute
commands as super user without entering a password.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/security/sudo.nix>
|
services.accounts-daemon.enableWhether to enable AccountsService, a DBus service for accessing the list of user accounts and information attached to those accounts.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/accountsservice.nix>
|
services.acpid.acEventCommandsShell commands to execute on an ac_adapter.* event.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/hardware/acpid.nix>
|
services.acpid.enableWhether to enable the ACPI daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/acpid.nix>
|
services.acpid.lidEventCommandsShell commands to execute on a button/lid.* event.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/hardware/acpid.nix>
|
services.acpid.powerEventCommandsShell commands to execute on a button/power.* event.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/hardware/acpid.nix>
|
services.activemq.baseDirThe base directory where ActiveMQ stores its persistent data and logs.
This will be overridden if you set "activemq.base" and "activemq.data"
in the javaProperties option. You can also override
this in activemq.xml.
Type:
"string"
Default:
"/var/activemq"
Declared by:
<nixpkgs/nixos/modules/services/amqp/activemq/default.nix>
|
services.activemq.configurationDirThe base directory for ActiveMQ's configuration. By default, this directory is searched for a file named activemq.xml, which should contain the configuration for the broker service.
Type:
"unspecified"
Default:
"/nix/store/3sci0dk3m2bcvil01nl6d7dhfrmc0y5b-apache-activemq-5.8.0/conf"
Declared by:
<nixpkgs/nixos/modules/services/amqp/activemq/default.nix>
|
services.activemq.configurationURIThe URI that is passed along to the BrokerFactory to
set up the configuration of the ActiveMQ broker service.
You should not need to change this. For custom configuration,
set the configurationDir instead, and create
an activemq.xml configuration file in it.
Type:
"string"
Default:
"xbean:activemq.xml"
Declared by:
<nixpkgs/nixos/modules/services/amqp/activemq/default.nix>
|
services.activemq.enableEnable the Apache ActiveMQ message broker service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/amqp/activemq/default.nix>
|
services.activemq.extraJavaOptionsAdd extra options here that you want to be sent to the Java runtime when the broker service is started.
Type:
"string"
Default:
""
Example:
"-Xmx2G -Xms2G -XX:MaxPermSize=512M"
Declared by:
<nixpkgs/nixos/modules/services/amqp/activemq/default.nix>
|
services.activemq.javaPropertiesSpecifies Java properties that are sent to the ActiveMQ broker service with the "-D" option. You can set properties here to change the behaviour and configuration of the broker. All essential properties that are not set here are automatically given reasonable defaults.
Type:
"attribute set"
Default:
{
}
Example:
{
java.net.preferIPv4Stack = "true";
}
Declared by:
<nixpkgs/nixos/modules/services/amqp/activemq/default.nix>
|
services.aiccu.automaticAutomatic Login and Tunnel activation
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.behindNATNotify the user that a NAT-kind network is detected
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.defaultRouteAdd a default route
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.enableEnable aiccu IPv6 over IPv4 SiXXs tunnel
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.interfaceNameThe name of the interface that will be used as a tunnel interface. On *BSD the ipv6_interface should be set to gifX (eg gif0) for proto-41 tunnels or tunX (eg tun0) for AYIYA tunnels.
Type:
"string"
Default:
"aiccu"
Example:
"sixxs"
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.localIPv4OverrideOverrides the IPv4 parameter received from TIC This allows one to configure a NAT into "DMZ" mode and then forwarding the proto-41 packets to an internal host. This is only needed for static proto-41 tunnels! AYIYA and heartbeat tunnels don't require this.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.makeHeartBeatsIn general you don't want to turn this off Of course only applies to AYIYA and heartbeat tunnels not to static ones
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.noConfigureDon't configure anything
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.passwordLogin credential
Type:
"null or string"
Default:
null
Example:
"TmAkRbBEr0"
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.pidFileLocation of PID File
Type:
"path"
Default:
"/run/aiccu.pid"
Example:
"/var/lib/aiccu/aiccu.pid"
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.protocolProtocol to use for setting up the tunnel
Type:
"string"
Default:
"tic"
Example:
"tic|tsp|l2tp"
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.requireTLSWhen set to true, if TLS is not supported on the server the TIC transaction will fail. When set to false, it will try a starttls, when that is not supported it will continue. In any case if AICCU is build with TLS support it will try to do a 'starttls' to the TIC server to see if that is supported.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.serverServer to use for setting up the tunnel
Type:
"string"
Default:
"tic.sixxs.net"
Example:
"enabled.ipv6server.net"
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.setupScriptScript to run after setting up the interfaces
Type:
"null or path"
Default:
null
Example:
"/var/lib/aiccu/fix-subnets.sh"
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.tunnelIDThe tunnel id to use, only required when there are multiple tunnels in the list
Type:
"null or string"
Default:
null
Example:
"T12345"
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.usernameLogin credential
Type:
"null or string"
Default:
null
Example:
"FAB5-SIXXS"
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.aiccu.verboseBe verbose?
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/aiccu.nix>
|
services.almir.director_addressIP/Hostname for Director to connect with bconsole.
Type:
"unspecified"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/backup/almir.nix>
|
services.almir.director_nameName of the Director to connect with bconsole.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/backup/almir.nix>
|
services.almir.director_passwordPassword for Director to connect with bconsole.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/backup/almir.nix>
|
services.almir.director_portPort for Director to connect with bconsole.
Type:
"integer"
Default:
9101
Declared by:
<nixpkgs/nixos/modules/services/backup/almir.nix>
|
services.almir.enableEnable Almir web server. Also configures postgresql database and installs bacula.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/almir.nix>
|
services.almir.portPort for Almir web server to listen on.
Type:
"integer"
Default:
35000
Declared by:
<nixpkgs/nixos/modules/services/backup/almir.nix>
|
services.almir.sqlalchemy_engine_urlDefine SQL database connection to bacula catalog as specified in http://docs.sqlalchemy.org/en/latest/core/engines.html#database-urls
Type:
"unspecified"
Default:
"postgresql:///bacula"
Example:
'' postgresql://bacula:bacula@localhost:5432/bacula mysql+mysqlconnector://<user>:<password>@<hostname>/<database>' sqlite:////var/lib/bacula/bacula.db' ''
Declared by:
<nixpkgs/nixos/modules/services/backup/almir.nix>
|
services.almir.timezoneTimezone as specified in https://en.wikipedia.org/wiki/List_of_tz_database_time_zones
Type:
"unspecified"
Example:
"Europe/Ljubljana"
Declared by:
<nixpkgs/nixos/modules/services/backup/almir.nix>
|
services.amule.dataDirThe directory holding configuration, incoming and temporary files.
Type:
"unspecified"
Default:
"/home/amule/"
Declared by:
<nixpkgs/nixos/modules/services/networking/amuled.nix>
|
services.amule.enableWhether to run the AMule daemon. You need to manually run "amuled --ec-config" to configure the service for the first time.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/amuled.nix>
|
services.amule.userThe user the AMule daemon should run as.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/amuled.nix>
|
services.apache-kafka.brokerIdBroker ID.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.enableWhether to enable Apache Kafka.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.extraPropertiesExtra properties for server.properties.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.hostnameHostname the broker should bind to.
Type:
"string"
Default:
"localhost"
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.jvmOptionsExtra command line options for the JVM running Kafka.
Type:
"list of strings"
Default:
[
"-server" "-Xmx1G" "-Xms1G" "-XX:+UseCompressedOops" "-XX:+UseParNewGC" "-XX:+UseConcMarkSweepGC" "-XX:+CMSClassUnloadingEnabled" "-XX:+CMSScavengeBeforeRemark" "-XX:+DisableExplicitGC" "-Djava.awt.headless=true" "-Djava.net.preferIPv4Stack=true"
]
Example:
[
"-Djava.net.preferIPv4Stack=true" "-Dcom.sun.management.jmxremote" "-Dcom.sun.management.jmxremote.local.only=true"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.log4jPropertiesKafka log4j property configuration.
Type:
"string"
Default:
'' log4j.rootLogger=INFO, stdout log4j.appender.stdout=org.apache.log4j.ConsoleAppender log4j.appender.stdout.layout=org.apache.log4j.PatternLayout log4j.appender.stdout.layout.ConversionPattern=[%d] %p %m (%c)%n ''
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.logDirsLog file directories
Type:
"list of paths"
Default:
[
"/tmp/kafka-logs"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.portPort number the broker should listen on.
Type:
"integer"
Default:
9092
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.serverPropertiesComplete server.properties content. Other server.properties config options will be ignored if this option is used.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apache-kafka.zookeeperZookeeper connection string
Type:
"string"
Default:
"localhost:2181"
Declared by:
<nixpkgs/nixos/modules/services/misc/apache-kafka.nix>
|
services.apcupsd.configTextContents of the runtime configuration file, apcupsd.conf. The default settings makes apcupsd autodetect USB UPSes, limit network access to localhost and shutdown the system when the battery level is below 50 percent, or when the UPS has calculated that it has 5 minutes or less of remaining power-on time. See man apcupsd.conf for details.
Type:
"string"
Default:
'' UPSTYPE usb NISIP 127.0.0.1 BATTERYLEVEL 50 MINUTES 5 ''
Declared by:
<nixpkgs/nixos/modules/services/monitoring/apcupsd.nix>
|
services.apcupsd.enableWhether to enable the APC UPS daemon. apcupsd monitors your UPS and permits orderly shutdown of your computer in the event of a power failure. User manual: http://www.apcupsd.com/manual/manual.html. Note that apcupsd runs as root (to allow shutdown of computer). You can check the status of your UPS with the "apcaccess" command.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/apcupsd.nix>
|
services.apcupsd.hooksEach attribute in this option names an apcupsd event and the string value it contains will be executed in a shell, in response to that event (prior to the default action). See "man apccontrol" for the list of events and what they represent. A hook script can stop apccontrol from doing its default action by exiting with value 99. Do not do this unless you know what you're doing.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
doshutdown = "# shell commands to notify that the computer is shutting down";
}
Declared by:
<nixpkgs/nixos/modules/services/monitoring/apcupsd.nix>
|
services.atd.allowEveryoneWhether to make /var/spool/at{jobs,spool}
writeable by everyone (and sticky). This is normally not
needed since the at commands are
setuid/setgid atd.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/scheduling/atd.nix>
|
services.atd.enableWhether to enable the at daemon, a command scheduler.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/scheduling/atd.nix>
|
services.atftpd.enableWhenever to enable the atftpd TFTP server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/atftpd.nix>
|
services.atftpd.rootDocument root directory for the atftpd.
Type:
"string"
Default:
"/var/empty"
Declared by:
<nixpkgs/nixos/modules/services/networking/atftpd.nix>
|
services.avahi.browseDomainsList of non-local DNS domains to be browsed.
Type:
"unspecified"
Default:
[
"0pointer.de" "zeroconf.org"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/avahi-daemon.nix>
|
services.avahi.enableWhether to run the Avahi daemon, which allows Avahi clients to use Avahi's service discovery facilities and also allows the local machine to advertise its presence and services (through the mDNS responder implemented by `avahi-daemon').
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/avahi-daemon.nix>
|
services.avahi.hostNameHost name advertised on the LAN. If not set, avahi will use the value of config.networking.hostName.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/avahi-daemon.nix>
|
services.avahi.ipv4Whether to use IPv4
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/avahi-daemon.nix>
|
services.avahi.ipv6Whether to use IPv6
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/avahi-daemon.nix>
|
services.avahi.nssmdnsWhether to enable the mDNS NSS (Name Service Switch) plug-in. Enabling it allows applications to resolve names in the `.local' domain by transparently querying the Avahi daemon.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/avahi-daemon.nix>
|
services.avahi.publishingWhether to allow publishing.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/avahi-daemon.nix>
|
services.avahi.wideAreaWhether to enable wide-area service discovery.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/avahi-daemon.nix>
|
services.bacula-dir.enableWhether to enable Bacula Director Daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-dir.extraConfigExtra configuration for Bacula Director Daemon.
Type:
"unspecified"
Default:
""
Example:
'' TODO ''
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-dir.extraDirectorConfigExtra configuration to be passed in Director directive.
Type:
"unspecified"
Default:
""
Example:
'' Maximum Concurrent Jobs = 20; Heartbeat Interval = 30; ''
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-dir.extraMessagesConfigExtra configuration to be passed in Messages directive.
Type:
"unspecified"
Default:
""
Example:
'' console = all ''
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-dir.nameThe director name used by the system administrator. This directive is required.
Type:
"unspecified"
Default:
"nixos-dir"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-dir.passwordSpecifies the password that must be supplied for a Director.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-dir.portSpecify the port (a positive integer) on which the Director daemon will listen for Bacula Console connections. This same port number must be specified in the Director resource of the Console configuration file. The default is 9101, so normally this directive need not be specified. This directive should not be used if you specify DirAddresses (N.B plural) directive.
Type:
"integer"
Default:
9101
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-fd.directorThis option defines director resources in Bacula File Daemon.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-fd.director.<name>.monitorIf Monitor is set to no (default), this director will have full
Type:
"unspecified"
Default:
"no"
Example:
"yes"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-fd.director.<name>.passwordSpecifies the password that must be supplied for a Director to b
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-fd.enableWhether to enable Bacula File Daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-fd.extraClientConfigExtra configuration to be passed in Client directive.
Type:
"unspecified"
Default:
""
Example:
'' Maximum Concurrent Jobs = 20; Heartbeat Interval = 30; ''
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-fd.extraMessagesConfigExtra configuration to be passed in Messages directive.
Type:
"unspecified"
Default:
""
Example:
'' console = all ''
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-fd.nameThe client name that must be used by the Director when connecting. Generally, it is a good idea to use a name related to the machine so that error messages can be easily identified if you have multiple Clients. This directive is required.
Type:
"unspecified"
Default:
"nixos-fd"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-fd.portThis specifies the port number on which the Client listens for Director connections. It must agree with the FDPort specified in the Client resource of the Director's configuration file. The default is 9102.
Type:
"integer"
Default:
9102
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.deviceThis option defines Device resources in Bacula Storage Daemon.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.device.<name>.archiveDeviceThe specified name-string gives the system file name of the storage device managed by this storage daemon. This will usually be the device file name of a removable storage device (tape drive), for example " /dev/nst0" or "/dev/rmt/0mbn". For a DVD-writer, it will be for example /dev/hdc. It may also be a directory name if you are archiving to disk storage.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.device.<name>.extraDeviceConfigExtra configuration to be passed in Device directive.
Type:
"unspecified"
Default:
""
Example:
'' LabelMedia = yes Random Access = no AutomaticMount = no RemovableMedia = no MaximumOpenWait = 60 AlwaysOpen = no ''
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.device.<name>.mediaTypeThe specified name-string names the type of media supported by this device, for example, "DLT7000". Media type names are arbitrary in that you set them to anything you want, but they must be known to the volume database to keep track of which storage daemons can read which volumes. In general, each different storage type should have a unique Media Type associated with it. The same name-string must appear in the appropriate Storage resource definition in the Director's configuration file.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.directorThis option defines Director resources in Bacula Storage Daemon.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.director.<name>.monitorIf Monitor is set to no (default), this director will have full
Type:
"unspecified"
Default:
"no"
Example:
"yes"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.director.<name>.passwordSpecifies the password that must be supplied for a Director to b
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.enableWhether to enable Bacula Storage Daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.extraMessagesConfigExtra configuration to be passed in Messages directive.
Type:
"unspecified"
Default:
""
Example:
'' console = all ''
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.extraStorageConfigExtra configuration to be passed in Storage directive.
Type:
"unspecified"
Default:
""
Example:
'' Maximum Concurrent Jobs = 20; Heartbeat Interval = 30; ''
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.nameSpecifies the Name of the Storage daemon.
Type:
"unspecified"
Default:
"nixos-sd"
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bacula-sd.portSpecifies port number on which the Storage daemon listens for Director connections. The default is 9103.
Type:
"integer"
Default:
9103
Declared by:
<nixpkgs/nixos/modules/services/backup/bacula.nix>
|
services.bind.blockedNetworksWhat networks are just blocked.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/bind.nix>
|
services.bind.cacheNetworksWhat networks are allowed to use us as a resolver.
Type:
"unspecified"
Default:
[
"127.0.0.0/24"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/bind.nix>
|
services.bind.configFileOverridable config file to use for named. By default, that generated by nixos.
Type:
"unspecified"
Default:
(build of named.conf)
Declared by:
<nixpkgs/nixos/modules/services/networking/bind.nix>
|
services.bind.enableWhether to enable BIND domain name server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/bind.nix>
|
services.bind.forwardersList of servers we should forward requests to.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/bind.nix>
|
services.bind.ipv4OnlyOnly use ipv4, even if the host supports ipv6.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/bind.nix>
|
services.bind.zonesList of zones we claim authority over. master=false means slave server; slaves means addresses who may request zone transfer.
Type:
"unspecified"
Default:
[
]
Example:
[
{
file = "/var/dns/example.com"; master = false; masters =
[
"192.168.0.1"
]
; name = "example.com"; slaves =
[
]
;
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/bind.nix>
|
services.bitlbee.authModeThe following authentication modes are available: Open -- Accept connections from anyone, use NickServ for user authentication. Closed -- Require authorization (using the PASS command during login) before allowing the user to connect at all. Registered -- Only allow registered users to use this server; this disables the register- and the account command until the user identifies himself.
Type:
"string"
Default:
"Open"
Declared by:
<nixpkgs/nixos/modules/services/networking/bitlbee.nix>
|
services.bitlbee.enableWhether to run the BitlBee IRC to other chat network gateway. Running it allows you to access the MSN, Jabber, Yahoo! and ICQ chat networks via an IRC client.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/bitlbee.nix>
|
services.bitlbee.extraDefaultsWill be inserted in the Default section of the config file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/bitlbee.nix>
|
services.bitlbee.extraSettingsWill be inserted in the Settings section of the config file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/bitlbee.nix>
|
services.bitlbee.interfaceThe interface the BitlBee deamon will be listening to. If `127.0.0.1', only clients on the local host can connect to it; if `0.0.0.0', clients can access it from any network interface.
Type:
"unspecified"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/networking/bitlbee.nix>
|
services.bitlbee.portNumberNumber of the port BitlBee will be listening to.
Type:
"unspecified"
Default:
6667
Declared by:
<nixpkgs/nixos/modules/services/networking/bitlbee.nix>
|
services.bosun.enableWhether to run bosun.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/bosun.nix>
|
services.bosun.extraConfigExtra configuration options for Bosun. You should describe your desired templates, alerts, macros, etc through this configuration option. A detailed description of the supported syntax can be found at-spi2-atk http://bosun.org/configuration.html
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/bosun.nix>
|
services.bosun.groupGroup account under which bosun runs.
Type:
"string"
Default:
"bosun"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/bosun.nix>
|
services.bosun.listenAddressThe host address and port that bosun's web interface will listen on.
Type:
"string"
Default:
":8070"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/bosun.nix>
|
services.bosun.opentsdbHostHost and port of the OpenTSDB database that stores bosun data.
Type:
"string"
Default:
"localhost:4242"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/bosun.nix>
|
services.bosun.stateFilePath to bosun's state file.
Type:
"string"
Default:
"/var/lib/bosun/bosun.state"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/bosun.nix>
|
services.bosun.userUser account under which bosun runs.
Type:
"string"
Default:
"bosun"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/bosun.nix>
|
services.btsync.apiKeyAPI key, which enables the developer API.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.checkForUpdatesDetermines whether to check for updates and alert the user about them in the UI.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.deviceNameName of the Bittorrent Sync device.
Type:
"string"
Example:
"Voltron"
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.downloadLimitDownload speed limit. 0 is unlimited (default).
Type:
"integer"
Default:
0
Example:
1024
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.enableIf enabled, start the Bittorrent Sync daemon. Once enabled,
you can interact with the service through the Web UI, or
configure it in your NixOS configuration. Enabling the
btsync service also installs a
multi-instance systemd unit which can be used to start
user-specific copies of the daemon. Once installed, you can
use systemctl start btsync@user to start
the daemon only for user user, using the
configuration file located at
$HOME/.config/btsync.conf.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.enableWebUIEnable Web UI for administration. Bound to the specified
httpListenAddress and
httpListenPort.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.encryptLANEncrypt LAN data.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.httpListenAddrHTTP address to bind to.
Type:
"string"
Default:
"0.0.0.0"
Example:
"1.2.3.4"
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.httpListenPortHTTP port to bind on.
Type:
"integer"
Default:
9000
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.httpLoginHTTP web login username.
Type:
"string"
Default:
""
Example:
"allyourbase"
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.httpPassHTTP web login password.
Type:
"string"
Default:
""
Example:
"arebelongtous"
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.listeningPortListening port. Defaults to 0 which randomizes the port.
Type:
"integer"
Default:
0
Example:
44444
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.sharedFoldersShared folder list. If enabled, web UI must be
disabled. Secrets can be generated using btsync
--generate-secret. Note that this secret will be
put inside the Nix store, so it is realistically not very
secret.
If you would like to be able to modify the contents of this
directories, it is recommended that you make your user a
member of the btsync group.
Directories in this list should be in the
btsync group, and that group must have
write access to the directory. It is also recommended that
chmod g+s is applied to the directory
so that any sub directories created will also belong to
the btsync group. Also,
setfacl -d -m group:btsync:rwx and
setfacl -m group:btsync:rwx should also
be applied so that the sub directories are writable by
the group.
Type:
"unspecified"
Default:
[
]
Example:
[
{
directory = "/home/user/sync_test"; knownHosts =
[
"192.168.1.2:4444" "192.168.1.3:4444"
]
; searchLAN = true; secret = "AHMYFPCQAHBM7LQPFXQ7WV6Y42IGUXJ5Y"; useDHT = false; useRelayServer = true; useSyncTrash = true; useTracker = true;
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.storagePathWhere to store the bittorrent sync files.
Type:
"path"
Default:
"/var/lib/btsync"
Example:
"/var/lib/btsync"
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.uploadLimitUpload speed limit. 0 is unlimited (default).
Type:
"integer"
Default:
0
Example:
1024
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.btsync.useUpnpUse Universal Plug-n-Play (UPnP)
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/btsync.nix>
|
services.cadvisor.enableWhether to enable cadvisor service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.cadvisor.hostCadvisor listening host
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.cadvisor.portCadvisor listening port
Type:
"integer"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.cadvisor.storageDriverCadvisor storage driver.
Type:
"null or string"
Default:
null
Example:
"influxdb"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.cadvisor.storageDriverDbCadvisord storage driver database name.
Type:
"string"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.cadvisor.storageDriverHostCadvisor storage driver host.
Type:
"string"
Default:
"localhost:8086"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.cadvisor.storageDriverPasswordCadvisor storage driver password.
Type:
"string"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.cadvisor.storageDriverSecureCadvisor storage driver, enable secure communication.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.cadvisor.storageDriverUserCadvisor storage driver username.
Type:
"string"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/cadvisor.nix>
|
services.canto-daemon.enableWhether to enable the canto RSS daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/canto-daemon.nix>
|
services.cgminer.configAdditional config
Type:
"unspecified"
Default:
{
}
Example:
{
auto-fan = true; auto-gpu = true; expiry = 120; failover-only = true; gpu-threads = 2; log = 5; queue = 1; scan-time = 60; temp-histeresys = 3;
}
Declared by:
<nixpkgs/nixos/modules/services/misc/cgminer.nix>
|
services.cgminer.enableWhether to enable cgminer, an ASIC/FPGA/GPU miner for bitcoin and litecoin.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/cgminer.nix>
|
services.cgminer.hardwareList of config options for every GPU
Type:
"unspecified"
Default:
[
]
Example:
[
{
gpu-engine = "0-985"; gpu-fan = "0-85"; gpu-memclock = 860; gpu-powertune = 20; intensity = 9; temp-cutoff = 95; temp-overheat = 85; temp-target = 75;
}
{
gpu-engine = "0-950"; gpu-fan = "0-85"; gpu-memclock = 825; gpu-powertune = 20; intensity = 9; temp-cutoff = 95; temp-overheat = 85; temp-target = 75;
}
]
Declared by:
<nixpkgs/nixos/modules/services/misc/cgminer.nix>
|
services.cgminer.poolsList of pools where to mine
Type:
"unspecified"
Default:
[
]
Example:
[
{
password = "X"; url = "http://p2pool.org:9332"; username = "17EUZxTvs9uRmPsjPZSYUU3zCz9iwstudk";
}
]
Declared by:
<nixpkgs/nixos/modules/services/misc/cgminer.nix>
|
services.cgminer.userUser account under which cgminer runs
Type:
"unspecified"
Default:
"cgminer"
Declared by:
<nixpkgs/nixos/modules/services/misc/cgminer.nix>
|
services.chronos.enableWhether to enable graphite web frontend.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/scheduling/chronos.nix>
|
services.chronos.httpPortChronos listening port
Type:
"integer"
Default:
4400
Declared by:
<nixpkgs/nixos/modules/services/scheduling/chronos.nix>
|
services.chronos.masterChronos mesos master zookeeper address
Type:
"string"
Default:
"zk://localhost:2181/mesos"
Declared by:
<nixpkgs/nixos/modules/services/scheduling/chronos.nix>
|
services.chronos.zookeeperHostsChronos mesos zookepper addresses
Type:
"list of strings"
Default:
[
"localhost:2181"
]
Declared by:
<nixpkgs/nixos/modules/services/scheduling/chronos.nix>
|
services.chrony.enableWhether to synchronise your machine's time using chrony. Make sure you disable NTP if you enable this service.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/chrony.nix>
|
services.chrony.extraConfigExtra configuration directives that should be added to
chrony.conf
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/chrony.nix>
|
services.chrony.initstepslewAllow chronyd to make a rapid measurement of the system clock error at boot time, and to correct the system clock by stepping before normal operation begins.
Type:
"unspecified"
Default:
{
enabled = true; servers =
[
"0.nixos.pool.ntp.org" "1.nixos.pool.ntp.org" "2.nixos.pool.ntp.org" "3.nixos.pool.ntp.org"
]
; threshold = 1000;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/chrony.nix>
|
services.chrony.serversThe set of NTP servers from which to synchronise.
Type:
"unspecified"
Default:
[
"0.nixos.pool.ntp.org" "1.nixos.pool.ntp.org" "2.nixos.pool.ntp.org" "3.nixos.pool.ntp.org"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/chrony.nix>
|
services.cjdns.ETHInterface.beaconAuto-connect to other cjdns nodes on the same network. Options: 0: Disabled. 1: Accept beacons, this will cause cjdns to accept incoming beacon messages and try connecting to the sender. 2: Accept and send beacons, this will cause cjdns to broadcast messages on the local network which contain a randomly generated per-session password, other nodes which have this set to 1 or 2 will hear the beacon messages and connect automatically.
Type:
"integer"
Default:
2
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.ETHInterface.bindBind to this device for native ethernet operation.
Type:
"unspecified"
Default:
""
Example:
"eth0"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.ETHInterface.connectToCredentials for connecting look similar to UDP credientials except they begin with the mac address.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
01:02:03:04:05:06 =
{
hostname = "homer.hype"; password = "5kG15EfpdcKNX3f2GSQ0H1HC7yIfxoCoImnO5FHM"; publicKey = "371zpkgs8ss387tmr81q04mp0hg1skb51hw34vk1cq644mjqhup0.k";
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.ETHInterface.connectTo.<name>.hostnameOptional hostname to add to /etc/hosts; prevents reverse lookup failures.
Type:
"string"
Default:
""
Example:
"foobar.hype"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.ETHInterface.connectTo.<name>.passwordAuthorized password to the opposite end of the tunnel.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.ETHInterface.connectTo.<name>.publicKeyPublic key at the opposite end of the tunnel.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.UDPInterface.bindAddress and port to bind UDP tunnels to.
Type:
"string"
Default:
""
Example:
"192.168.1.32:43211"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.UDPInterface.connectToCredentials for making UDP tunnels.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
192.168.1.1:27313 =
{
hostname = "homer.hype"; password = "5kG15EfpdcKNX3f2GSQ0H1HC7yIfxoCoImnO5FHM"; publicKey = "371zpkgs8ss387tmr81q04mp0hg1skb51hw34vk1cq644mjqhup0.k";
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.UDPInterface.connectTo.<name>.hostnameOptional hostname to add to /etc/hosts; prevents reverse lookup failures.
Type:
"string"
Default:
""
Example:
"foobar.hype"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.UDPInterface.connectTo.<name>.passwordAuthorized password to the opposite end of the tunnel.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.UDPInterface.connectTo.<name>.publicKeyPublic key at the opposite end of the tunnel.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.admin.bindBind the administration port to this address and port.
Type:
"string"
Default:
"127.0.0.1:11234"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.authorizedPasswordsAny remote cjdns nodes that offer these passwords on connection will be allowed to route through this node.
Type:
"list of strings"
Default:
[
]
Example:
[
"snyrfgkqsc98qh1y4s5hbu0j57xw5s0" "z9md3t4p45mfrjzdjurxn4wuj0d8swv" "49275fut6tmzu354pq70sr5b95qq0vj"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.confFileIgnore all other cjdns options and load configuration from this file.
Type:
"string"
Default:
""
Example:
"/etc/cjdroute.conf"
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.cjdns.enableWhether to enable the cjdns network encryption and routing engine. A file at /etc/cjdns.keys will be created if it does not exist to contain a random secret key that your IPv6 address will be derived from.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/cjdns.nix>
|
services.clamav.updater.configExtra configuration for freshclam. Contents will be added verbatim to the configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/security/clamav.nix>
|
services.clamav.updater.enableWhether to enable automatic ClamAV virus definitions database updates.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/clamav.nix>
|
services.clamav.updater.frequencyNumber of database checks per day.
Type:
"unspecified"
Default:
12
Declared by:
<nixpkgs/nixos/modules/services/security/clamav.nix>
|
services.cloud-init.enableEnable the cloud-init service. This services reads configuration metadata in a cloud environment and configures the machine according to this metadata. This configuration is not completely compatible with the NixOS way of doing configuration, as configuration done by cloud-init might be overriden by a subsequent nixos-rebuild call. However, some parts of cloud-init fall outside of NixOS's responsibility, like filesystem resizing and ssh public key provisioning, and cloud-init is useful for that parts. Thus, be wary that using cloud-init in NixOS might come as some cost.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/system/cloud-init.nix>
|
services.cntlm.domainProxy account domain/workgroup name.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/networking/cntlm.nix>
|
services.cntlm.enableWhether to enable the cntlm, which start a local proxy.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/cntlm.nix>
|
services.cntlm.extraConfigVerbatim contents of cntlm.conf.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/cntlm.nix>
|
services.cntlm.netbios_hostnameThe hostname of your machine.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/cntlm.nix>
|
services.cntlm.passwordProxy account password. Note: use chmod 0600 on /etc/cntlm.password for security.
Type:
"string"
Default:
"/etc/cntlm.password"
Declared by:
<nixpkgs/nixos/modules/services/networking/cntlm.nix>
|
services.cntlm.portSpecifies on which ports the cntlm daemon listens.
Type:
"unspecified"
Default:
[
3128
]
Declared by:
<nixpkgs/nixos/modules/services/networking/cntlm.nix>
|
services.cntlm.proxyA list of NTLM/NTLMv2 authenticating HTTP proxies. Parent proxy, which requires authentication. The same as proxy on the command-line, can be used more than once to specify unlimited number of proxies. Should one proxy fail, cntlm automatically moves on to the next one. The connect request fails only if the whole list of proxies is scanned and (for each request) and found to be invalid. Command-line takes precedence over the configuration file.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/networking/cntlm.nix>
|
services.cntlm.usernameProxy account name, without the possibility to include domain name ('at' sign is interpreted literally).
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/networking/cntlm.nix>
|
services.collectd.autoLoadPluginEnable plugin autoloading.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/collectd.nix>
|
services.collectd.dataDirData directory for collectd agent.
Type:
"path"
Default:
"/var/lib/collectd"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/collectd.nix>
|
services.collectd.enableWhether to enable collectd agent.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/collectd.nix>
|
services.collectd.extraConfigExtra configuration for collectd.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/collectd.nix>
|
services.collectd.includeAdditional paths to load config from.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/collectd.nix>
|
services.collectd.pidFileLocation of collectd pid file.
Type:
"path"
Default:
"/var/run/collectd.pid"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/collectd.nix>
|
services.collectd.userUser under which to run collectd.
Type:
"null or string"
Default:
"collectd"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/collectd.nix>
|
services.consul.alerts.consulAddrConsul api listening adddress
Type:
"string"
Default:
"localhost:8500"
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.alerts.enableWhether to enable Whether to enable consul-alerts.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.alerts.listenAddrApi listening address.
Type:
"string"
Default:
"localhost:9000"
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.alerts.watchChecksWhether to enable check watcher.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.alerts.watchEventsWhether to enable event watcher.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.dropPrivilegesWhether the consul agent should be run as a non-root consul user.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.enableEnables the consul daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.extraConfigExtra configuration options which are serialized to json and added to the config.json file.
Type:
"unspecified"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.extraConfigFilesAdditional configuration files to pass to consul NOTE: These will not trigger the service to be restarted when altered.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.forceIpv4Whether we should force the interfaces to only pull ipv4 addresses.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.interface.advertiseThe name of the interface to pull the advertise_addr from.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.interface.bindThe name of the interface to pull the bind_addr from.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.joinNodesA list of addresses of nodes which should be joined at startup if the current node is in a left state.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.joinRetriesThe number of times to retry connecting to the join nodes.
Type:
"integer"
Default:
10
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.leaveOnStopIf enabled, causes a leave action to be sent when closing consul. This allows a clean termination of the node, but permanently removes it from the cluster. You probably don't want this option unless you are running a node which going offline in a permanent / semi-permanent fashion.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.consul.webUiEnables the web interface on the consul http port.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/consul.nix>
|
services.couchdb.bindAddressDefines the IP address by which CouchDB will be accessible.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.configFileConfiguration file for persisting runtime changes. File needs to be readable and writable from couchdb user/group.
Type:
"string"
Default:
"/var/lib/couchdb/couchdb.ini"
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.databaseDirSpecifies location of CouchDB database files (*.couch named). This location should be writable and readable for the user the CouchDB service runs as (couchdb by default).
Type:
"path"
Default:
"/var/lib/couchdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.enableWhether to run CouchDB Server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.extraConfigExtra configuration. Overrides any other cofiguration.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.groupGroup account under which couchdb runs.
Type:
"string"
Default:
"couchdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.logFileSpecifies the location of file for logging output.
Type:
"path"
Default:
"/var/log/couchdb.log"
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.portDefined the port number to listen.
Type:
"integer"
Default:
5984
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.uriFileThis file contains the full URI that can be used to access this instance of CouchDB. It is used to help discover the port CouchDB is running on (if it was set to 0 (e.g. automatically assigned any free one). This file should be writable and readable for the user that runs the CouchDB service (couchdb by default).
Type:
"path"
Default:
"/var/run/couchdb/couchdb.uri"
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.userUser account under which couchdb runs.
Type:
"string"
Default:
"couchdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.couchdb.viewIndexDirSpecifies location of CouchDB view index files. This location should be writable and readable for the user that runs the CouchDB service (couchdb by default).
Type:
"path"
Default:
"/var/lib/couchdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/couchdb.nix>
|
services.cpuminer-cryptonight.enableWhether to enable the cpuminer cryptonight miner.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix>
|
services.cpuminer-cryptonight.passPassword for mining server
Type:
"string"
Default:
"x"
Declared by:
<nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix>
|
services.cpuminer-cryptonight.threadsNumber of miner threads, defaults to available processors
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix>
|
services.cpuminer-cryptonight.urlURL of mining server
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix>
|
services.cpuminer-cryptonight.userUsername for mining server
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix>
|
services.crashplan.enableStarts crashplan background service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/crashplan.nix>
|
services.cron.cronFilesA list of extra crontab files that will be read and appended to the main crontab file when the cron service starts.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/scheduling/cron.nix>
|
services.cron.enableWhether to enable the Vixie cron daemon.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/scheduling/cron.nix>
|
services.cron.mailtoEmail address to which job output will be mailed.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/scheduling/cron.nix>
|
services.cron.systemCronJobsA list of Cron jobs to be appended to the system-wide
crontab. See the manual page for crontab for the expected
format. If you want to get the results mailed you must setuid
sendmail. See security.setuidOwners
If neither /var/cron/cron.deny nor /var/cron/cron.allow exist only root
will is allowed to have its own crontab file. The /var/cron/cron.deny file
is created automatically for you. So every user can use a crontab.
Many nixos modules set systemCronJobs, so if you decide to disable vixie cron
and enable another cron daemon, you may want it to get its system crontab
based on systemCronJobs.
Type:
"list of strings"
Default:
[
]
Example:
[ "* * * * * test ls -l / > /tmp/cronout 2>&1" "* * * * * eelco echo Hello World > /home/eelco/cronout" ]
Declared by:
<nixpkgs/nixos/modules/services/scheduling/cron.nix>
|
services.dbus.enableWhether to start the D-Bus message bus daemon, which is required by many other system services and applications.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/system/dbus.nix>
|
services.dbus.packagesPackages whose D-Bus configuration files should be included in
the configuration of the D-Bus system-wide message bus.
Specifically, every file in
is included.
pkg/etc/dbus-1/system.d
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/system/dbus.nix>
|
services.dd-agent.api_keyThe Datadog API key to associate the agent with your account
Type:
"string"
Example:
"ae0aa6a8f08efa988ba0a17578f009ab"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/dd-agent.nix>
|
services.dd-agent.enableWhether to enable the dd-agent montioring service
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/dd-agent.nix>
|
services.dd-agent.hostnameThe hostname to show in the Datadog dashboard (optional)
Type:
"null or string"
Default:
null
Example:
"mymachine.mydomain"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/dd-agent.nix>
|
services.dd-agent.nginxConfigDatadog nginx integration configuration
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/monitoring/dd-agent.nix>
|
services.dd-agent.postgresqlConfigDatadog PostgreSQL integration configuration
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/monitoring/dd-agent.nix>
|
services.ddclient.domainDomain name to synchronize.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.ddclient.enableWhether to synchronise your machine's IP address with a dynamic DNS provider (e.g. dyndns.org).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.ddclient.extraConfigExtra configuration. Contents will be added verbatim to the configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.ddclient.passwordPassword.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.ddclient.protocolProtocol to use with dynamic DNS provider (see http://sourceforge.net/apps/trac/ddclient/wiki/Protocols).
Type:
"string"
Default:
"dyndns2"
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.ddclient.serverServer address.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.ddclient.sslWhether to use to use SSL/TLS to connect to dynamic DNS provider.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.ddclient.useMethod to determine the IP address to send to the dymanic DNS provider.
Type:
"string"
Default:
"web, web=checkip.dyndns.com/, web-skip='Current IP Address: '"
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.ddclient.usernameUsername.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/ddclient.nix>
|
services.deluge.enableStart Deluge daemon.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/torrent/deluge.nix>
|
services.deluge.web.enableStart Deluge Web daemon.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/torrent/deluge.nix>
|
services.dhcpd.configFileThe path of the DHCP server configuration file. If no file is specified, a file is generated using the other options.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpd.nix>
|
services.dhcpd.enableWhether to enable the DHCP server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpd.nix>
|
services.dhcpd.extraConfigExtra text to be appended to the DHCP server configuration file. Currently, you almost certainly need to specify something here, such as the options specifying the subnet mask, DNS servers, etc.
Type:
"unspecified"
Default:
""
Example:
''
option subnet-mask 255.255.255.0;
option broadcast-address 192.168.1.255;
option routers 192.168.1.5;
option domain-name-servers 130.161.158.4, 130.161.33.17, 130.161.180.1;
option domain-name "example.org";
subnet 192.168.1.0 netmask 255.255.255.0 {
range 192.168.1.100 192.168.1.200;
}
''Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpd.nix>
|
services.dhcpd.interfacesThe interfaces on which the DHCP server should listen.
Type:
"unspecified"
Default:
[
"eth0"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpd.nix>
|
services.dhcpd.machinesA list mapping ethernet addresses to IP addresses for the DHCP server.
Type:
"unspecified"
Default:
[
]
Example:
[
{
ethernetAddress = "00:16:76:9a:32:1d"; hostName = "foo"; ipAddress = "192.168.1.10";
}
{
ethernetAddress = "00:19:d1:1d:c4:9a"; hostName = "bar"; ipAddress = "192.168.1.11";
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/dhcpd.nix>
|
services.dictd.DBsList of databases to make available.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/misc/dictd.nix>
|
services.dictd.enableWhether to enable the DICT.org dictionary server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/dictd.nix>
|
services.diod.allsquashRemap all users to "nobody". The attaching user need not be present in the password file.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.authRequiredAllow clients to connect without authentication, i.e. without a valid MUNGE credential.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.enableWhether to enable the diod 9P file server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.exportallExport all file systems listed in /proc/mounts. If new file systems are mounted after diod has started, they will become immediately mountable. If there is a duplicate entry for a file system in the exports list, any options listed in the exports entry will apply.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.exportoptsEstablish a default set of export options. These are overridden, not appended to, by opts attributes in an "exports" entry.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.exportsList the file systems that clients will be allowed to mount. All paths should be fully qualified. The exports table can include two types of element: a string element (as above), or an alternate table element form { path="/path", opts="ro" }. In the alternate form, the (optional) opts attribute is a comma-separated list of export options. The two table element forms can be mixed in the exports table. Note that although diod will not traverse file system boundaries for a given mount due to inode uniqueness constraints, subdirectories of a file system can be separately exported.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.extraConfigExtra configuration options for diod.conf.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.listen[ "IP:PORT" [,"IP:PORT",...] ] List the interfaces and ports that diod should listen on.
Type:
"list of strings"
Default:
[
"0.0.0.0:564"
]
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.logdestSet the destination for logging. The value has the form of "syslog:facility:level" or "filename".
Type:
"string"
Default:
"syslog:daemon:err"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.nwthreadsSets the (fixed) number of worker threads created to handle 9P requests for a unique aname.
Type:
"integer"
Default:
16
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.squashuserChange the squash user. The squash user must be present in the password file.
Type:
"string"
Default:
"nobody"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.statfsPassthruThis option configures statfs to return the host file system's type rather than V9FS_MAGIC.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.diod.userdbThis option disables password/group lookups. It allows any uid to attach and assumes gid=uid, and supplementary groups contain only the primary gid.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/diod.nix>
|
services.disnix.enableWhether to enable Disnix
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/disnix.nix>
|
services.disnix.infrastructureList of name value pairs containing properties for the infrastructure model
Type:
"unspecified"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/misc/disnix.nix>
|
services.disnix.publishAvahiWhether to publish capabilities/properties as a Disnix service through Avahi
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/disnix.nix>
|
services.disnix.publishInfrastructure.enableWhether to publish capabilities/properties of this machine in as attributes in the infrastructure option
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/disnix.nix>
|
services.disnix.publishInfrastructure.enableAuthenticationWhether to publish authentication credentials through the infrastructure attribute (not recommended in combination with Avahi)
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/disnix.nix>
|
services.disnix.useWebServiceInterfaceWhether to enable the DisnixWebService interface running on Apache Tomcat
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/disnix.nix>
|
services.dnscrypt-proxy.enableEnable dnscrypt-proxy. The proxy relays regular DNS queries to a DNSCrypt enabled upstream resolver. The traffic between the client and the upstream resolver is encrypted and authenticated, which may mitigate the risk of MITM attacks and third-party snooping (assuming the upstream is trustworthy).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix>
|
services.dnscrypt-proxy.localAddressListen for DNS queries on this address.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix>
|
services.dnscrypt-proxy.portListen on this port.
Type:
"integer"
Default:
53
Declared by:
<nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix>
|
services.dnscrypt-proxy.resolverNameThe name of the upstream DNSCrypt resolver to use.
See /nix/store/8dlsxxga5cwyk669570z8ibzs18dv9ns-dnscrypt-proxy-1.4.3/share/dnscrypt-proxy/dnscrypt-resolvers.csv
for alternative resolvers (e.g., if you are concerned about logging
and/or server location).
Type:
"string"
Default:
"opendns"
Declared by:
<nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix>
|
services.dnscrypt-proxy.tcpOnlyForce sending encrypted DNS queries to the upstream resolver over TCP instead of UDP (on port 443). Enabling this option may help circumvent filtering, but should not be used otherwise.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix>
|
services.dnsmasq.enableWhether to run dnsmasq.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/dnsmasq.nix>
|
services.dnsmasq.extraConfigExtra configuration directives that should be added to
dnsmasq.conf
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/dnsmasq.nix>
|
services.dnsmasq.resolveLocalQueriesWhether dnsmasq should resolve local queries (i.e. add 127.0.0.1 to /etc/resolv.conf)
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/dnsmasq.nix>
|
services.dnsmasq.serversThe DNS servers which dnsmasq should query.
Type:
"unspecified"
Default:
[
]
Example:
[
"8.8.8.8" "8.8.4.4"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/dnsmasq.nix>
|
services.dockerRegistry.enableWhether to enable docker registry server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/docker-registry.nix>
|
services.dockerRegistry.extraConfigDocker extra registry configuration. See https://github.com/docker/docker-registry/blob/master/config/config_sample.yml
Type:
"attribute set of strings"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/misc/docker-registry.nix>
|
services.dockerRegistry.hostDocker registry host or ip to bind to.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/misc/docker-registry.nix>
|
services.dockerRegistry.portDocker registry port to bind to.
Type:
"integer"
Default:
5000
Declared by:
<nixpkgs/nixos/modules/services/misc/docker-registry.nix>
|
services.dockerRegistry.storagePathDocker registry storage path.
Type:
"path"
Default:
"/var/lib/docker/registry"
Declared by:
<nixpkgs/nixos/modules/services/misc/docker-registry.nix>
|
services.dovecot2.configFileConfig file used for the whole dovecot configuration.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.enableWhether to enable the Dovecot 2.x POP3/IMAP server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.enableImapStart the IMAP listener (when Dovecot is enabled).
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.enablePop3Start the POP3 listener (when Dovecot is enabled).
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.extraConfigAdditional entries to put verbatim into Dovecot's config file.
Type:
"unspecified"
Default:
""
Example:
"mail_debug = yes"
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.groupDovecot group name.
Type:
"unspecified"
Default:
"dovecot2"
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.mailLocationLocation that dovecot will use for mail folders. Dovecot mail_location option.
Type:
"unspecified"
Default:
"maildir:/var/spool/mail/%u"
Example:
"maildir:~/mail:INBOX=/var/spool/mail/%u"
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.showPAMFailureShow the PAM failure message on authentication error (useful for OTPW).
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.sslCACertCA certificate used by the server certificate.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.sslServerCertServer certificate
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.sslServerKeyServer key.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.dovecot2.userDovecot user name.
Type:
"unspecified"
Default:
"dovecot2"
Declared by:
<nixpkgs/nixos/modules/services/mail/dovecot.nix>
|
services.drbd.configContents of the drbd.conf configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/drbd.nix>
|
services.drbd.enableWhether to enable support for DRBD, the Distributed Replicated Block Device.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/drbd.nix>
|
services.ejabberd.confDirLocation of the config directory of ejabberd
Type:
"unspecified"
Default:
"/var/ejabberd"
Declared by:
<nixpkgs/nixos/modules/services/networking/ejabberd.nix>
|
services.ejabberd.enableWhether to enable ejabberd server
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ejabberd.nix>
|
services.ejabberd.loadDumpsConfiguration dump that should be loaded on the first startup
Type:
"unspecified"
Default:
[
]
Example:
[ ./myejabberd.dump ]
Declared by:
<nixpkgs/nixos/modules/services/networking/ejabberd.nix>
|
services.ejabberd.logsDirLocation of the logfile directory of ejabberd
Type:
"unspecified"
Default:
"/var/log/ejabberd"
Declared by:
<nixpkgs/nixos/modules/services/networking/ejabberd.nix>
|
services.ejabberd.spoolDirLocation of the spooldir of ejabberd
Type:
"unspecified"
Default:
"/var/lib/ejabberd"
Declared by:
<nixpkgs/nixos/modules/services/networking/ejabberd.nix>
|
services.ejabberd.virtualHostsVirtualhosts that ejabberd should host. Hostnames are surrounded with doublequotes and separated by commas
Type:
"unspecified"
Default:
''"localhost"''
Declared by:
<nixpkgs/nixos/modules/services/networking/ejabberd.nix>
|
services.elasticsearch.cluster_nameElasticsearch name that identifies your cluster for auto-discovery.
Type:
"string"
Default:
"elasticsearch"
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.dataDirData directory for elasticsearch.
Type:
"path"
Default:
"/var/lib/elasticsearch"
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.enableWhether to enable elasticsearch.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.extraCmdLineOptionsExtra command line options for the elasticsearch launcher.
Type:
"list of strings"
Default:
[
]
Example:
[
"-Djava.net.preferIPv4Stack=true"
]
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.extraConfExtra configuration for elasticsearch.
Type:
"string"
Default:
""
Example:
'' node.name: "elasticsearch" node.master: true node.data: false index.number_of_shards: 5 index.number_of_replicas: 1 ''
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.hostElasticsearch listen address.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.loggingElasticsearch logging configuration.
Type:
"string"
Default:
''
rootLogger: INFO, console
logger:
action: INFO
com.amazonaws: WARN
appender:
console:
type: console
layout:
type: consolePattern
conversionPattern: "[%d{ISO8601}][%-5p][%-25c] %m%n"
''Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.pluginsExtra elasticsearch plugins
Type:
"list of derivations"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.portElasticsearch port to listen for HTTP traffic.
Type:
"integer"
Default:
9200
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.elasticsearch.tcp_portElasticsearch port for the node to node communication.
Type:
"integer"
Default:
9300
Declared by:
<nixpkgs/nixos/modules/services/search/elasticsearch.nix>
|
services.etcd.advertiseClientUrlsEtcd list of this member's client URLs to advertise to the rest of the cluster.
Type:
"list of strings"
Default:
[
"http://localhost:4001"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.dataDirEtcd data directory.
Type:
"path"
Default:
"/var/lib/etcd"
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.discoveryEtcd discovery url
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.enableWhether to enable etcd.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.extraConfEtcd extra configuration. See https://github.com/coreos/etcd/blob/master/Documentation/configuration.md#environment-variables
Type:
"attribute set of strings"
Default:
{
}
Example:
{
"CORS": "*",
"NAME": "default-name",
"MAX_RESULT_BUFFER": "1024",
"MAX_CLUSTER_SIZE": "9",
"MAX_RETRY_ATTEMPTS": "3"
}
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.initialAdvertisePeerUrlsEtcd list of this member's peer URLs to advertise to rest of the cluster.
Type:
"list of strings"
Default:
[
"http://localhost:7001"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.initialClusterEtcd initial cluster configuration for bootstrapping.
Type:
"list of strings"
Default:
[
"nixos=http://localhost:7001"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.initialClusterStateEtcd initial cluster configuration for bootstrapping.
Type:
"one of new, existing"
Default:
"new"
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.initialClusterTokenEtcd initial cluster token for etcd cluster during bootstrap.
Type:
"string"
Default:
"etcd-cluster"
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.listenClientUrlsEtcd list of URLs to listen on for client traffic.
Type:
"list of strings"
Default:
[
"http://localhost:4001"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.listenPeerUrlsEtcd list of URLs to listen on for peer traffic.
Type:
"list of strings"
Default:
[
"http://localhost:7001"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.etcd.nameEtcd unique node name.
Type:
"string"
Default:
"nixos"
Declared by:
<nixpkgs/nixos/modules/services/misc/etcd.nix>
|
services.exim.configVerbatim Exim configuration. This should not contain exim_user, exim_group, exim_path, or spool_directory.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/exim.nix>
|
services.exim.enableWhether to enable the Exim mail transfer agent.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/exim.nix>
|
services.exim.groupGroup to use when no root privileges are required.
Type:
"string"
Default:
"exim"
Declared by:
<nixpkgs/nixos/modules/services/mail/exim.nix>
|
services.exim.spoolDirLocation of the spool directory of exim.
Type:
"string"
Default:
"/var/spool/exim"
Declared by:
<nixpkgs/nixos/modules/services/mail/exim.nix>
|
services.exim.userUser to use when no root privileges are required. In particular, this applies when receiving messages and when doing remote deliveries. (Local deliveries run as various non-root users, typically as the owner of a local mailbox.) Specifying this value as root is not supported.
Type:
"string"
Default:
"exim"
Declared by:
<nixpkgs/nixos/modules/services/mail/exim.nix>
|
services.fail2ban.daemonConfigThe contents of Fail2ban's main configuration file. It's generally not necessary to change it.
Type:
"string"
Default:
'' [Definition] loglevel = INFO logtarget = SYSLOG socket = /run/fail2ban/fail2ban.sock pidfile = /run/fail2ban/fail2ban.pid ''
Declared by:
<nixpkgs/nixos/modules/services/security/fail2ban.nix>
|
services.fail2ban.enableWhether to enable the fail2ban service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/fail2ban.nix>
|
services.fail2ban.jailsThe configuration of each Fail2ban “jail”. A jail
consists of an action (such as blocking a port using
iptables) that is triggered when a
filter applied to a log file triggers more than a certain
number of times in a certain time period. Actions are
defined in /etc/fail2ban/action.d,
while filters are defined in
/etc/fail2ban/filter.d.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
apache-nohome-iptables = "# Block an IP address if it accesses a non-existent\n# home directory more than 5 times in 10 minutes,\n# since that indicates that it's scanning.\nfilter = apache-nohome\naction = iptables-multiport[name=HTTP, port=\"http,https\"]\nlogpath = /var/log/httpd/error_log*\nfindtime = 600\nbantime = 600\nmaxretry = 5\n";
}
Declared by:
<nixpkgs/nixos/modules/services/security/fail2ban.nix>
|
services.fcgiwrap.enableWhether to enable fcgiwrap, a server for running CGI applications over FastCGI.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix>
|
services.fcgiwrap.groupGroup permissions for the socket.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix>
|
services.fcgiwrap.preforkProcessesNumber of processes to prefork.
Type:
"integer"
Default:
1
Declared by:
<nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix>
|
services.fcgiwrap.socketAddressSocket address. In case of a UNIX socket, this should be its filesystem path.
Type:
"string"
Default:
"/run/fcgiwrap.sock"
Example:
"1.2.3.4:5678"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix>
|
services.fcgiwrap.socketTypeSocket type: 'unix', 'tcp' or 'tcp6'.
Type:
"string"
Default:
"unix"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix>
|
services.fcgiwrap.userUser permissions for the socket.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix>
|
services.fcron.allowUsers allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
Type:
"list of strings"
Default:
[
"all"
]
Declared by:
<nixpkgs/nixos/modules/services/scheduling/fcron.nix>
|
services.fcron.denyUsers forbidden from using fcron.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/scheduling/fcron.nix>
|
services.fcron.enableWhether to enable the fcron daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/scheduling/fcron.nix>
|
services.fcron.maxSerialJobsMaximum number of serial jobs which can run simultaneously.
Type:
"integer"
Default:
1
Declared by:
<nixpkgs/nixos/modules/services/scheduling/fcron.nix>
|
services.fcron.queuelenNumber of jobs the serial queue and the lavg queue can contain.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/scheduling/fcron.nix>
|
services.fcron.systabThe "system" crontab contents.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/scheduling/fcron.nix>
|
services.felix.bundlesList of bundles that should be activated on startup
Type:
"unspecified"
Default:
[
(build of apache-felix-remoteshell-bundle-1.0.4)
]
Declared by:
<nixpkgs/nixos/modules/services/misc/felix.nix>
|
services.felix.enableWhether to enable the Apache Felix OSGi service
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/felix.nix>
|
services.felix.groupGroup account under which Apache Felix runs.
Type:
"unspecified"
Default:
"osgi"
Declared by:
<nixpkgs/nixos/modules/services/misc/felix.nix>
|
services.felix.userUser account under which Apache Felix runs.
Type:
"unspecified"
Default:
"osgi"
Declared by:
<nixpkgs/nixos/modules/services/misc/felix.nix>
|
services.firebird.baseDirLocation containing data/ and system/ directories. data/ stores the databases, system/ stores the password database security2.fdb.
Type:
"unspecified"
Default:
"/var/db/firebird"
Declared by:
<nixpkgs/nixos/modules/services/databases/firebird.nix>
|
services.firebird.enableWhether to enable the Firebird super server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/firebird.nix>
|
services.firebird.portPort Firebird uses.
Type:
"unspecified"
Default:
"3050"
Declared by:
<nixpkgs/nixos/modules/services/databases/firebird.nix>
|
services.firebird.userUser account under which firebird runs.
Type:
"unspecified"
Default:
"firebird"
Declared by:
<nixpkgs/nixos/modules/services/databases/firebird.nix>
|
services.firefox.syncserver.allowNewUsersWhether to allow new-user signups on the server. Only request by existing accounts will be honored.
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix>
|
services.firefox.syncserver.enableWhether to enable a Firefox Sync Server, this give the opportunity to
Firefox users to store all synchronized data on their own server. To use this
server, Firefox users should visit the about:config, and
replicate the following change
services.sync.tokenServerURI: http://localhost:5000/token/1.0/sync/1.5
where http://localhost:5000/ corresponds to the
public url of the server.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix>
|
services.firefox.syncserver.listen.addressAddress on which the sync server listen to.
Type:
"string"
Default:
"127.0.0.1"
Example:
"0.0.0.0"
Declared by:
<nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix>
|
services.firefox.syncserver.listen.portPort on which the sync server listen to.
Type:
"integer"
Default:
5000
Declared by:
<nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix>
|
services.firefox.syncserver.privateConfigThe private config file is used to extend the generated config with confidential
information, such as the syncserver.sqlUri setting if it contains a
password, and the syncserver.secret setting is used by the server to
generate cryptographically-signed authentication tokens.
If this file does not exists, then it is created with a generated
syncserver.secret settings.
Type:
"string"
Default:
"/etc/firefox/syncserver-secret.ini"
Declared by:
<nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix>
|
services.firefox.syncserver.publicUrlPublic URL with which firefox users can use to access the sync server.
Type:
"string"
Default:
"http://localhost:5000/"
Example:
"http://sync.example.com/"
Declared by:
<nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix>
|
services.firefox.syncserver.sqlUriThe location of the database. This URL is composed of
dialect[+driver]://user:password@host/dbname[?key=value..],
where dialect is a database name such as
mysql, oracle, postgresql,
etc., and driver the name of a DBAPI, such as
psycopg2, pyodbc, cx_oracle,
etc. The
SQLAlchemy documentation provides more examples and describe the syntax of
the expected URL.
Type:
"string"
Default:
"sqlite:////var/db/firefox-sync-server.db"
Example:
"postgresql://scott:tiger@localhost/test"
Declared by:
<nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix>
|
services.flashpolicyd.enableWhether to enable the Flash Policy server. This is necessary if you want Flash applications to make connections to your server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/flashpolicyd.nix>
|
services.flashpolicyd.policyThe policy to be served. The default is to allow connections from any domain to any port.
Type:
"unspecified"
Default:
'' <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <site-control permitted-cross-domain-policies="master-only"/> <allow-access-from domain="*" to-ports="*" /> </cross-domain-policy> ''
Declared by:
<nixpkgs/nixos/modules/services/networking/flashpolicyd.nix>
|
services.fleet.enableWhether to enable fleet service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fleet.etcdCafileFleet TLS ca file when SSL certificate authentication is enabled in etcd endpoints.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fleet.etcdCertfileFleet TLS cert file when SSL certificate authentication is enabled in etcd endpoints.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fleet.etcdKeyfileFleet TLS key file when SSL certificate authentication is enabled in etcd endpoints.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fleet.etcdServersFleet list of etcd endpoints to use.
Type:
"list of strings"
Default:
[
"http://127.0.0.1:4001"
]
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fleet.extraConfigFleet extra config. See https://github.com/coreos/fleet/blob/master/Documentation/deployment-and-configuration.md for configuration options.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
VERBOSITY = 1;
ETCD_REQUEST_TIMEOUT = "2.0";
AGENT_TTL = "40s";
}
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fleet.listenFleet listening addresses.
Type:
"list of strings"
Default:
[
"/var/run/fleet.sock"
]
Example:
[
"/var/run/fleet.sock" "127.0.0.1:49153"
]
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fleet.metadataKey/value pairs that are published with the local to the fleet registry. This data can be used directly by a client of fleet to make scheduling decisions.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
region = "us-west";
az = "us-west-1";
}
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fleet.publicIpFleet IP address that should be published with the local Machine's state and any socket information. If not set, fleetd will attempt to detect the IP it should publish based on the machine's IP routing information.
Type:
"null or string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/fleet.nix>
|
services.fluentd.configFluentd config.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/logging/fluentd.nix>
|
services.fluentd.enableWhether to enable fluentd.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/fluentd.nix>
|
services.foldingAtHome.configExtra configuration. Contents will be added verbatim to the configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/folding-at-home.nix>
|
services.foldingAtHome.enableWhether to enable the Folding@Home to use idle CPU time.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/folding-at-home.nix>
|
services.foldingAtHome.nicknameA unique handle for statistics.
Type:
"unspecified"
Default:
"Anonymous"
Declared by:
<nixpkgs/nixos/modules/services/misc/folding-at-home.nix>
|
services.fourStore.databaseRDF database name. If it doesn't exist, it will be created. Databases are stored in /var/lib/4store.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/4store.nix>
|
services.fourStore.enableWhether to enable 4Store RDF database server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/4store.nix>
|
services.fourStore.optionsExtra CLI options to pass to 4Store.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/4store.nix>
|
services.fourStoreEndpoint.databaseRDF database name to expose via the endpoint. Defaults to local 4Store database name.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/4store-endpoint.nix>
|
services.fourStoreEndpoint.enableWhether to enable 4Store SPARQL endpoint.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/4store-endpoint.nix>
|
services.fourStoreEndpoint.listenAddressIP address to listen on.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/databases/4store-endpoint.nix>
|
services.fourStoreEndpoint.optionsExtra CLI options to pass to 4Store's 4s-httpd process.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/4store-endpoint.nix>
|
services.fourStoreEndpoint.portport to listen on.
Type:
"unspecified"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/databases/4store-endpoint.nix>
|
services.fprintd.enableWhether to enable fprintd daemon and PAM module for fingerprint readers handling.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/fprintd.nix>
|
services.fprot.updater.enableWhether to enable automatic F-Prot virus definitions database updates.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/fprot.nix>
|
services.fprot.updater.frequencyUpdate virus definitions every X minutes.
Type:
"unspecified"
Default:
30
Declared by:
<nixpkgs/nixos/modules/services/security/fprot.nix>
|
services.fprot.updater.licenseKeyfileLicense keyfile. Defaults to the one supplied with installation package.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/security/fprot.nix>
|
services.fprot.updater.productDataproduct.data file. Defaults to the one supplied with installation package.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/security/fprot.nix>
|
services.frandom.enableenable the /dev/frandom device (a very fast random number generator)
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/frandom.nix>
|
services.freefall.devicesDevice paths to all internal spinning hard drives.
Type:
"list of strings"
Default:
[
"/dev/sda"
]
Declared by:
<nixpkgs/nixos/modules/services/hardware/freefall.nix>
|
services.freefall.enableWhether to protect HP/Dell laptop hard drives (not SSDs) in free fall.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/freefall.nix>
|
services.freenet.enableEnable the Freenet daemon
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/freenet.nix>
|
services.freenet.niceSet the nice level for the Freenet daemon
Type:
"integer"
Default:
10
Declared by:
<nixpkgs/nixos/modules/services/networking/freenet.nix>
|
services.geoclue2.enableWhether to enable GeoClue 2 daemon, a DBus service that provides location informationfor accessing.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/geoclue2.nix>
|
services.ghostOne.configExtra configuration options.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/games/ghost-one.nix>
|
services.ghostOne.enableEnable Ghost-One Warcraft3 game hosting server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/games/ghost-one.nix>
|
services.ghostOne.languageThe language of bot messages: English, Spanish, Russian, Serbian or Turkish.
Type:
"string"
Default:
"English"
Declared by:
<nixpkgs/nixos/modules/services/games/ghost-one.nix>
|
services.ghostOne.mappathThe path to the directory where you keep your map files. GHost One doesn't require map files but if it has access to them it can send them to players and automatically calculate most map config values. GHost One will search [bot_mappath + map_localpath] for the map file (map_localpath is set in each map's config file).
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/games/ghost-one.nix>
|
services.ghostOne.war3pathThe path to your local Warcraft III directory, which must contain war3.exe, storm.dll, and game.dll.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/games/ghost-one.nix>
|
services.gitDaemon.basePathRemap all the path requests as relative to the given path. For example, if you set base-path to /srv/git, then if you later try to pull git://example.com/hello.git, Git daemon will interpret the path as /srv/git/hello.git.
Type:
"string"
Default:
""
Example:
"/srv/git/"
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitDaemon.enableEnable Git daemon, which allows public hosting of git repositories without any access controls. This is mostly intended for read-only access. You can allow write access by setting daemon.receivepack configuration item of the repository to true. This is solely meant for a closed LAN setting where everybody is friendly. If you need any access controls, use something else.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitDaemon.exportAllPublish all directories that look like Git repositories (have the objects and refs subdirectories), even if they do not have the git-daemon-export-ok file. If disabled, you need to touch .git/git-daemon-export-ok in each repository you want the daemon to publish. Warning: enabling this without a repository whitelist or basePath publishes every git repository you have.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitDaemon.groupGroup under which Git daemon would be running.
Type:
"string"
Default:
"git"
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitDaemon.listenAddressListen on a specific IP address or hostname.
Type:
"string"
Default:
""
Example:
"example.com"
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitDaemon.optionsExtra configuration options to be passed to Git daemon.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitDaemon.portPort to listen on.
Type:
"integer"
Default:
9418
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitDaemon.repositoriesA whitelist of paths of git repositories, or directories containing repositories all of which would be published. Paths must not end in "/". Warning: leaving this empty and enabling exportAll publishes all repositories in your filesystem or basePath if specified.
Type:
"list of strings"
Default:
[
]
Example:
[
"/srv/git" "/home/user/git/repo2"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitDaemon.userUser under which Git daemon would be running.
Type:
"string"
Default:
"git"
Declared by:
<nixpkgs/nixos/modules/services/networking/git-daemon.nix>
|
services.gitlab.backupPathGitlab path for backups.
Type:
"string"
Default:
"/var/gitlab/state/backup"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.databaseHostGitlab database hostname.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.databaseNameGitlab database name.
Type:
"string"
Default:
"gitlab"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.databasePasswordGitlab database user password.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.databaseUsernameGitlab database user.
Type:
"string"
Default:
"gitlab"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.emailFromThe source address for emails sent by gitlab.
Type:
"string"
Default:
"example@example.org"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.enableEnable the gitlab service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.hostGitlab host name. Used e.g. for copy-paste URLs.
Type:
"string"
Default:
"nixos"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.portGitlab server listening port.
Type:
"integer"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.satelliteDirGitlab directory to store checked out git trees requires for operation.
Type:
"string"
Default:
"/var/gitlab/git-satellites"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitlab.stateDirGitlab state directory, logs are stored here.
Type:
"string"
Default:
"/var/gitlab/state"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitlab.nix>
|
services.gitolite.adminPubkeyInitial administrative public key for Gitolite. This should be an SSH Public Key. Note that this key will only be used once, upon the first initialization of the Gitolite user. The key string cannot have any line breaks in it.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitolite.nix>
|
services.gitolite.commonHooksA list of custom git hooks that get copied to ~/.gitolite/hooks/common.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/misc/gitolite.nix>
|
services.gitolite.dataDirGitolite home directory (used to store all the repositories).
Type:
"string"
Default:
"/var/lib/gitolite"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitolite.nix>
|
services.gitolite.enableEnable gitolite management under the
gitolite user. After
switching to a configuration with Gitolite enabled, you can
then run git clone
gitolite@host:gitolite-admin.git to manage it further.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/gitolite.nix>
|
services.gitolite.userGitolite user account. This is the username of the gitolite endpoint.
Type:
"string"
Default:
"gitolite"
Declared by:
<nixpkgs/nixos/modules/services/misc/gitolite.nix>
|
services.gnome3.at-spi2-core.enableWhether to enable at-spi2-core, a service for the Assistive Technologies available on the GNOME platform.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/at-spi2-core.nix>
|
services.gnome3.evolution-data-server.enableWhether to enable Evolution Data Server, a collection of services for storing addressbooks and calendars.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/evolution-data-server.nix>
|
services.gnome3.gnome-documents.enableWhether to enable GNOME Documents services, a document manager application for GNOME.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/gnome-documents.nix>
|
services.gnome3.gnome-keyring.enableWhether to enable GNOME Keyring daemon, a service designed to take care of the user's security credentials, such as user names and passwordsa search engine.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/gnome-keyring.nix>
|
services.gnome3.gnome-online-accounts.enableWhether to enable GNOME Online Accounts daemon, a service that provides a single sign-on framework for the GNOME desktop.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-accounts.nix>
|
services.gnome3.gnome-online-miners.enableWhether to enable GNOME Online Miners, a service that crawls through your online content.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-miners.nix>
|
services.gnome3.gnome-user-share.enableWhether to enable GNOME User Share, a service that exports the contents of the Public folder in your home directory on the local network.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/gnome-user-share.nix>
|
services.gnome3.gvfs.enableWhether to enable gvfs backends, userspace virtual filesystem used by GNOME components via D-Bus.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/gvfs.nix>
|
services.gnome3.seahorse.enableWhether to enable Seahorse search provider for the GNOME Shell activity search.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/seahorse.nix>
|
services.gnome3.sushi.enableWhether to enable Sushi, a quick previewer for nautilus.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/sushi.nix>
|
services.gnome3.tracker.enableWhether to enable Tracker services, a search engine, search tool and metadata storage system.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/gnome3/tracker.nix>
|
services.gnunet.enableWhether to run the GNUnet daemon. GNUnet is GNU's anonymous peer-to-peer communication and file sharing framework.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/gnunet.nix>
|
services.gnunet.extraOptionsAdditional options that will be copied verbatim in `gnunet.conf'. See `gnunet.conf(5)' for details.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/gnunet.nix>
|
services.gnunet.fileSharing.quotaMaximum file system usage (in MiB) for file sharing.
Type:
"unspecified"
Default:
1024
Declared by:
<nixpkgs/nixos/modules/services/networking/gnunet.nix>
|
services.gnunet.load.hardNetUpBandwidthHard bandwidth limit (in bits per second) when uploading data.
Type:
"unspecified"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/networking/gnunet.nix>
|
services.gnunet.load.maxNetDownBandwidthMaximum bandwidth usage (in bits per second) for GNUnet when downloading data.
Type:
"unspecified"
Default:
50000
Declared by:
<nixpkgs/nixos/modules/services/networking/gnunet.nix>
|
services.gnunet.load.maxNetUpBandwidthMaximum bandwidth usage (in bits per second) for GNUnet when downloading data.
Type:
"unspecified"
Default:
50000
Declared by:
<nixpkgs/nixos/modules/services/networking/gnunet.nix>
|
services.gnunet.tcp.portThe TCP port for use by GNUnet.
Type:
"unspecified"
Default:
2086
Declared by:
<nixpkgs/nixos/modules/services/networking/gnunet.nix>
|
services.gnunet.udp.portThe UDP port for use by GNUnet.
Type:
"unspecified"
Default:
2086
Declared by:
<nixpkgs/nixos/modules/services/networking/gnunet.nix>
|
services.gogoclient.autorunWhether to automatically start the tunnel.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/gogoclient.nix>
|
services.gogoclient.enableEnable the gogoCLIENT IPv6 tunnel.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/gogoclient.nix>
|
services.gogoclient.passwordPath to a file (as a string), containing your gogoNET password, if any.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/gogoclient.nix>
|
services.gogoclient.serverThe Gateway6 server to be used.
Type:
"unspecified"
Default:
"anonymous.freenet6.net"
Example:
"broker.freenet6.net"
Declared by:
<nixpkgs/nixos/modules/services/networking/gogoclient.nix>
|
services.gogoclient.usernameYour Gateway6 login name, if any.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/gogoclient.nix>
|
services.gpm.enableWhether to enable GPM, the General Purpose Mouse daemon, which enables mouse support in virtual consoles.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/ttys/gpm.nix>
|
services.gpm.protocolMouse protocol to use.
Type:
"string"
Default:
"ps/2"
Declared by:
<nixpkgs/nixos/modules/services/ttys/gpm.nix>
|
services.gpsd.debugLevelThe debugging level.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/misc/gpsd.nix>
|
services.gpsd.deviceA device may be a local serial device for GPS input, or a URL of the form:
[{dgpsip|ntrip}://][user:passwd@]host[:port][/stream]
in which case it specifies an input source for DGPS or ntrip data.
Type:
"string"
Default:
"/dev/ttyUSB0"
Declared by:
<nixpkgs/nixos/modules/services/misc/gpsd.nix>
|
services.gpsd.enableWhether to enable `gpsd', a GPS service daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/gpsd.nix>
|
services.gpsd.portThe port where to listen for TCP connections.
Type:
"integer"
Default:
2947
Declared by:
<nixpkgs/nixos/modules/services/misc/gpsd.nix>
|
services.gpsd.readonlyWhether to enable the broken-device-safety, otherwise known as read-only mode. Some popular bluetooth and USB receivers lock up or become totally inaccessible when probed or reconfigured. This switch prevents gpsd from writing to a receiver. This means that gpsd cannot configure the receiver for optimal performance, but it also means that gpsd cannot break the receiver. A better solution would be for Bluetooth to not be so fragile. A platform independent method to identify serial-over-Bluetooth devices would also be nice.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/gpsd.nix>
|
services.graphite.api.enableWhether to enable graphite api. Graphite api is lightweight alternative to graphite web, with api and without dashboard. It's advised to use grafana as alternative dashboard and influxdb as alternative to graphite carbon. For more information visit http://graphite-api.readthedocs.org/en/latest/
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.api.extraConfigExtra configuration for graphite api.
Type:
"string"
Default:
''
whisper:
directories:
- /var/db/graphite/whisper
''Example:
allowed_origins: - dashboard.example.com cheat_times: true influxdb: host: localhost port: 8086 user: influxdb pass: influxdb db: metrics cache: CACHE_TYPE: 'filesystem' CACHE_DIR: '/tmp/graphite-api-cache'
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.api.findersList of finder plugins to load.
Type:
"list of derivations"
Default:
[
]
Example:
[
(build of python2.7-graphite-influxdb-0.3)
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.api.functionsList of functions to load.
Type:
"list of strings"
Default:
[
"graphite_api.functions.SeriesFunctions" "graphite_api.functions.PieFunctions"
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.api.hostGraphite web service listen address.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.api.portGraphite api service port.
Type:
"integer"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.aggregationRulesDefines if and how received metrics will be agregated.
Type:
"null or string"
Default:
null
Example:
'' <env>.applications.<app>.all.requests (60) = sum <env>.applications.<app>.*.requests <env>.applications.<app>.all.latency (60) = avg <env>.applications.<app>.*.latency ''
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.blacklistAny metrics received which match one of the experssions will be dropped.
Type:
"null or string"
Default:
null
Example:
"^some.noisy.metric.prefix..*"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.configContent of carbon configuration file.
Type:
"string"
Default:
'' [cache] # Listen on localhost by default for security reasons UDP_RECEIVER_INTERFACE = 127.0.0.1 PICKLE_RECEIVER_INTERFACE = 127.0.0.1 LINE_RECEIVER_INTERFACE = 127.0.0.1 CACHE_QUERY_INTERFACE = 127.0.0.1 # Do not log every update LOG_UPDATES = False LOG_CACHE_HITS = False ''
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.enableAggregatorWhether to enable carbon agregator, the carbon buffering service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.enableCacheWhether to enable carbon cache, the graphite storage daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.enableRelayWhether to enable carbon relay, the carbon replication and sharding service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.relayRulesRelay rules are used to send certain metrics to a certain backend.
Type:
"null or string"
Default:
null
Example:
'' [example] pattern = ^mydata\.foo\..+ servers = 10.1.2.3, 10.1.2.4:2004, myserver.mydomain.com ''
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.rewriteRulesRegular expression patterns that can be used to rewrite metric names in a search and replace fashion.
Type:
"null or string"
Default:
null
Example:
'' [post] _sum$ = _avg$ = ''
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.storageAggregationDefines how to aggregate data to lower-precision retentions.
Type:
"null or string"
Default:
null
Example:
'' [all_min] pattern = \.min$ xFilesFactor = 0.1 aggregationMethod = min ''
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.storageSchemasDefines retention rates for storing metrics.
Type:
"null or string"
Default:
""
Example:
'' [apache_busyWorkers] pattern = ^servers\.www.*\.workers\.busyWorkers$ retentions = 15s:7d,1m:21d,15m:5y ''
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.carbon.whitelistOnly metrics received which match one of the experssions will be persisted.
Type:
"null or string"
Default:
null
Example:
".*"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.dataDirData directory for graphite.
Type:
"path"
Default:
"/var/db/graphite"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.pager.alertsAlerts configuration for graphite-pager.
Type:
"string"
Default:
''
alerts:
- target: constantLine(100)
warning: 90
critical: 200
name: Test
''Example:
pushbullet_key: pushbullet_api_key
alerts:
- target: stats.seatgeek.app.deal_quality.venue_info_cache.hit
warning: .5
critical: 1
name: Deal quality venue cache hits
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.pager.enableWhether to enable graphite-pager service. For more information visit https://github.com/seatgeek/graphite-pager
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.pager.graphiteUrlURL to your graphite service.
Type:
"string"
Default:
"http://127.0.0.1:8080"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.pager.redisUrlRedis connection string.
Type:
"string"
Default:
"redis://localhost:6379/"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.seyren.enableWhether to enable seyren service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.seyren.extraConfigExtra seyren configuration. See https://github.com/scobal/seyren#config
Type:
"attribute set of strings"
Default:
{
}
Example:
{
GRAPHITE_USERNAME = "user";
GRAPHITE_PASSWORD = "pass";
}
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.seyren.graphiteUrlHost where graphite service runs.
Type:
"string"
Default:
"http://127.0.0.1:8080"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.seyren.mongoUrlMongodb connection string.
Type:
"string"
Default:
"mongodb://127.0.0.1:27017/seyren"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.seyren.portSeyren listening port.
Type:
"integer"
Default:
8081
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.seyren.seyrenUrlHost where seyren is accessible.
Type:
"string"
Default:
"http://localhost:8081/"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.web.enableWhether to enable graphite web frontend.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.web.hostGraphite web frontend listen address.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.graphite.web.portGraphite web frontend port.
Type:
"integer"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/monitoring/graphite.nix>
|
services.gvpe.configFileGVPE config file, if already present
Type:
"unspecified"
Default:
null
Example:
"/root/my-gvpe-conf"
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.gvpe.configTextGVPE config contents
Type:
"unspecified"
Default:
null
Example:
'' tcp-port = 655 udp-port = 655 mtu = 1480 ifname = vpn0 node = alpha hostname = alpha.example.org connect = always enable-udp = true enable-tcp = true on alpha if-up = if-up-0 on alpha pid-file = /var/gvpe/gvpe.pid ''
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.gvpe.customIFSetupAdditional commands to apply in ifup script
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.gvpe.enableWhether to run gvpe
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.gvpe.ipAddressIP address to assign to GVPE interface
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.gvpe.nodenameGVPE node name
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.gvpe.startOnCondition to start GVPE
Type:
"unspecified"
Default:
"started network-interfaces"
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.gvpe.stopOnCondition to stop GVPE
Type:
"unspecified"
Default:
"stopping network-interfaces"
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.gvpe.subnetIP subnet assigned to GVPE network
Type:
"unspecified"
Default:
null
Example:
"10.0.0.0/8"
Declared by:
<nixpkgs/nixos/modules/services/networking/gvpe.nix>
|
services.haproxy.configContents of the HAProxy configuration file,
haproxy.conf.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/haproxy.nix>
|
services.haproxy.enableWhether to enable HAProxy, the reliable, high performance TCP/HTTP load balancer.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/haproxy.nix>
|
services.hardware.pommed.configFileThe path to the pommed.conf file.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/services/hardware/pommed.nix>
|
services.hardware.pommed.enableWhether to use the pommed tool to handle Apple laptop keyboard hotkeys.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/pommed.nix>
|
services.haveged.enableWhether to enable to haveged entropy daemon, which refills /dev/random when low.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/haveged.nix>
|
services.haveged.refill_thresholdThe number of bits of available entropy beneath which haveged should refill the entropy pool.
Type:
"integer"
Default:
1024
Declared by:
<nixpkgs/nixos/modules/services/security/haveged.nix>
|
services.hbase.dataDirSpecifies location of HBase database files. This location should be writable and readable for the user the HBase service runs as (hbase by default).
Type:
"path"
Default:
"/var/lib/hbase"
Declared by:
<nixpkgs/nixos/modules/services/databases/hbase.nix>
|
services.hbase.enableWhether to run HBase.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/hbase.nix>
|
services.hbase.groupGroup account under which HBase runs.
Type:
"string"
Default:
"hbase"
Declared by:
<nixpkgs/nixos/modules/services/databases/hbase.nix>
|
services.hbase.logDirSpecifies the location of HBase log files.
Type:
"path"
Default:
"/var/log/hbase"
Declared by:
<nixpkgs/nixos/modules/services/databases/hbase.nix>
|
services.hbase.userUser account under which HBase runs.
Type:
"string"
Default:
"hbase"
Declared by:
<nixpkgs/nixos/modules/services/databases/hbase.nix>
|
services.hostapd.channelChannel number (IEEE 802.11) Please note that some drivers do not use this value from hostapd and the channel will need to be configured separately with iwconfig.
Type:
"integer"
Default:
7
Example:
11
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.driverWhich driver hostapd will use. Most things will probably use the default.
Type:
"string"
Default:
"nl80211"
Example:
"hostapd"
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.enableEnable putting a wireless interface into infrastructure mode, allowing other wireless devices to associate with the wireless interface and do wireless networking. A simple access point will enable hostapd.wpa, and hostapd.wpa_passphrase, hostapd.ssid, dhcpd on the wireless interface to provide IP addresses to the associated stations, and nat (from the wireless interface to an upstream interface).
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.extraCfgExtra configuration options to put in the hostapd.conf
Type:
"string"
Default:
""
Example:
'' auth_algo=0 ieee80211n=1 ht_capab=[HT40-][SHORT-GI-40][DSSS_CCK-40] ''
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.groupmembers of this group can control hostapd
Type:
"string"
Default:
"wheel"
Example:
"network"
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.hwModeOperation mode (a = IEEE 802.11a, b = IEEE 802.11b, g = IEEE 802.11g
Type:
"string"
Default:
"b"
Example:
"g"
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.interfaceThe interfaces hostapd will use.
Type:
"unspecified"
Default:
""
Example:
"wlan0"
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.ssidSSID to be used in IEEE 802.11 management frames.
Type:
"string"
Default:
"nixos"
Example:
"mySpecialSSID"
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.wpaenable WPA (IEEE 802.11i/D3.0) to authenticate to the access point
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.hostapd.wpaPassphraseWPA-PSK (pre-shared-key) passphrase. Clients will need this passphrase to associate with this access point. Warning: This passphrase will get put into a world-readable file in the nix store.
Type:
"string"
Default:
"my_sekret"
Example:
"any_64_char_string"
Declared by:
<nixpkgs/nixos/modules/services/networking/hostapd.nix>
|
services.httpd.adminAddrE-mail address of the server administrator.
Type:
"null or string"
Example:
"admin@example.org"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.configFileOverride the configuration file used by Apache. By default, NixOS generates one automatically.
Type:
"path"
Default:
(build of httpd.conf)
Example:
pkgs.writeText "httpd.conf" "# my custom config file ...";
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.documentRootThe path of Apache's document root directory. If left undefined, an empty directory in the Nix store will be used as root.
Type:
"null or path"
Default:
null
Example:
"/data/webserver/docs"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.enableWhether to enable the Apache HTTP Server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.enablePHPWhether to enable the PHP module.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.enableSSLWhether to enable SSL (https) support.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.enableUserDirWhether to enable serving ~/public_html as
/~.
username
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.extraConfigThese lines go to httpd.conf verbatim. They will go after directories and directory aliases defined by default.
Type:
"string"
Default:
""
Example:
'' <Directory /home> Options FollowSymlinks AllowOverride All </Directory> ''
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.extraModulesAdditional Apache modules to be used. These can be
specified as a string in the case of modules distributed
with Apache, or as an attribute set specifying the
name and path of the
module.
Type:
"list of unspecifieds"
Default:
[
]
Example:
[ "proxy_connect" { name = "php5"; path = "${pkgs.php}/modules/libphp5.so"; } ]Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.extraSubservicesExtra subservices to enable in the webserver.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.globalRedirectIf set, all requests for this host are redirected permanently to the given URL.
Type:
"null or string"
Default:
null
Example:
"http://newserver.example.org/"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.groupGroup under which httpd runs. The account is created automatically if it doesn't exist.
Type:
"string"
Default:
"wwwrun"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.hostNameCanonical hostname for the server.
Type:
"string"
Default:
"localhost"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.logDirDirectory for Apache's log files. It is created automatically.
Type:
"path"
Default:
"/var/log/httpd"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.logFormatLog format for Apache's log files. Possible values are: combined, common, referer, agent.
Type:
"string"
Default:
"common"
Example:
"combined"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.logPerVirtualHostIf enabled, each virtual host gets its own
access_log and
error_log, namely suffixed by the
hostName of the virtual host.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.maxClientsMaximum number of httpd processes (prefork)
Type:
"integer"
Default:
150
Example:
8
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.maxRequestsPerChildMaximum number of httpd requests answered per httpd child (prefork), 0 means unlimited
Type:
"integer"
Default:
0
Example:
500
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.multiProcessingModuleMulti-processing module to be used by Apache. Available
modules are prefork (the default;
handles each request in a separate child process),
worker (hybrid approach that starts a
number of child processes each running a number of
threads) and event (a recent variant of
worker that handles persistent
connections more efficiently).
Type:
"string"
Default:
"prefork"
Example:
"worker"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.phpOptionsOptions appended to the PHP configuration file php.ini.
Type:
"string"
Default:
""
Example:
'' date.timezone = "CET" ''
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.portPort for the server. 0 means use the default port: 80 for http and 443 for https (i.e. when enableSSL is set).
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.robotsEntriesSpecification of pages to be ignored by web crawlers. See http://www.robotstxt.org/ for details.
Type:
"string"
Default:
""
Example:
"Disallow: /foo/"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.servedDirsThis option provides a simple way to serve static directories.
Type:
"list of attribute sets"
Default:
[
]
Example:
[
{
dir = "/home/eelco/Dev/nix-homepage"; urlPath = "/nix";
}
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.servedFilesThis option provides a simple way to serve individual, static files.
Type:
"list of attribute sets"
Default:
[
]
Example:
[
{
dir = "/home/eelco/some-file.png"; urlPath = "/foo/bar.png";
}
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.serverAliasesAdditional names of virtual hosts served by this virtual host configuration.
Type:
"list of strings"
Default:
[
]
Example:
[
"www.example.org" "www.example.org:8080" "example.org"
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.sslServerCertPath to server SSL certificate.
Type:
"null or path"
Default:
null
Example:
"/var/host.cert"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.sslServerChainPath to server SSL chain file.
Type:
"path"
Example:
"/var/ca.pem"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.sslServerKeyPath to server SSL certificate key.
Type:
"path"
Example:
"/var/host.key"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.stateDirDirectory for Apache's transient runtime state (such as PID
files). It is created automatically. Note that the default,
/run/httpd, is deleted at boot time.
Type:
"path"
Default:
"/run/httpd"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.userUser account under which httpd runs. The account is created automatically if it doesn't exist.
Type:
"string"
Default:
"wwwrun"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHostsSpecification of the virtual hosts served by Apache. Each element should be an attribute set specifying the configuration of the virtual host. The available options are the non-global options permissible for the main host.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
documentRoot = "/data/webroot-foo"; hostName = "foo";
}
{
documentRoot = "/data/webroot-bar"; hostName = "bar";
}
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.adminAddrE-mail address of the server administrator.
Type:
"null or string"
Default:
null
Example:
"admin@example.org"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.documentRootThe path of Apache's document root directory. If left undefined, an empty directory in the Nix store will be used as root.
Type:
"null or path"
Default:
null
Example:
"/data/webserver/docs"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.enableSSLWhether to enable SSL (https) support.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.enableUserDirWhether to enable serving ~/public_html as
/~.
username
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.extraConfigThese lines go to httpd.conf verbatim. They will go after directories and directory aliases defined by default.
Type:
"string"
Default:
""
Example:
'' <Directory /home> Options FollowSymlinks AllowOverride All </Directory> ''
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.extraSubservicesExtra subservices to enable in the webserver.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.globalRedirectIf set, all requests for this host are redirected permanently to the given URL.
Type:
"null or string"
Default:
null
Example:
"http://newserver.example.org/"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.hostNameCanonical hostname for the server.
Type:
"string"
Default:
"localhost"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.logFormatLog format for Apache's log files. Possible values are: combined, common, referer, agent.
Type:
"string"
Default:
"common"
Example:
"combined"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.portPort for the server. 0 means use the default port: 80 for http and 443 for https (i.e. when enableSSL is set).
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.robotsEntriesSpecification of pages to be ignored by web crawlers. See http://www.robotstxt.org/ for details.
Type:
"string"
Default:
""
Example:
"Disallow: /foo/"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.servedDirsThis option provides a simple way to serve static directories.
Type:
"list of attribute sets"
Default:
[
]
Example:
[
{
dir = "/home/eelco/Dev/nix-homepage"; urlPath = "/nix";
}
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.servedFilesThis option provides a simple way to serve individual, static files.
Type:
"list of attribute sets"
Default:
[
]
Example:
[
{
dir = "/home/eelco/some-file.png"; urlPath = "/foo/bar.png";
}
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.serverAliasesAdditional names of virtual hosts served by this virtual host configuration.
Type:
"list of strings"
Default:
[
]
Example:
[
"www.example.org" "www.example.org:8080" "example.org"
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.sslServerCertPath to server SSL certificate.
Type:
"null or path"
Default:
null
Example:
"/var/host.cert"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.sslServerChainPath to server SSL chain file.
Type:
"path"
Example:
"/var/ca.pem"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.httpd.virtualHosts.*.sslServerKeyPath to server SSL certificate key.
Type:
"path"
Example:
"/var/host.key"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix>
|
services.i2pd.eep.hostAddress to forward incoming traffic to. 127.0.0.1 by default.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.eep.keyFileFile name containing destination keys. privKeys.dat by default.
Type:
"string"
Default:
"privKeys.dat"
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.eep.portPort to forward incoming traffic to. 80 by default.
Type:
"integer"
Default:
80
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.enableEnables I2Pd as a running service upon activation.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.enableIPv6Enables IPv6 connectivity. Disabled by default.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.extIpYour external IP.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.http.portHTTP listen port.
Type:
"integer"
Default:
7070
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.irc.destDestination I2P tunnel endpoint address of IRC server. irc.postman.i2p by default.
Type:
"string"
Default:
"irc.postman.i2p"
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.irc.keyFileFile name containing destination keys. privKeys.dat by default.
Type:
"string"
Default:
"privKeys.dat"
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.irc.portLocal IRC tunnel endoint port to listen on. 6668 by default.
Type:
"integer"
Default:
6668
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.portI2P listen port. If no one is given the router will pick between 9111 and 30777.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.proxy.httpPortHTTP proxy listen port.
Type:
"integer"
Default:
4446
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.proxy.socksPortSOCKS proxy listen port.
Type:
"integer"
Default:
4447
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.sam.portLocal SAM tunnel endpoint. Usually 7656. SAM is disabled if not specified.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.i2pd.unreachableIf the router is declared to be unreachable and needs introduction nodes.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/i2pd.nix>
|
services.icecast.admin.passwordPassword used for all administration functions.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.admin.userUsername used for all administration functions.
Type:
"string"
Default:
"admin"
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.enableWhether to enable Icecast server.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.extraConficecast.xml content.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.groupGroup privileges for the server.
Type:
"string"
Default:
"nogroup"
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.hostnameDNS name or IP address that will be used for the stream directory lookups or possibily the playlist generation if a Host header is not provided.
Type:
"string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.listen.addressAddress Icecast will listen on.
Type:
"string"
Default:
"::"
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.listen.portTCP port that will be used to accept client connections.
Type:
"integer"
Default:
8000
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.logDirBase directory used for logging.
Type:
"path"
Default:
"/var/log/icecast"
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.icecast.userUser privileges for the server.
Type:
"string"
Default:
"nobody"
Declared by:
<nixpkgs/nixos/modules/services/audio/icecast.nix>
|
services.influxdb.adminPortThe port where influxdb admin listens
Type:
"integer"
Default:
8083
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.apiExtraConfigExtra influxdb api configuration
Type:
"string"
Default:
'' read-timeout = "5s" ''
Example:
'' ssl-port = 8084 ssl-cert = /path/to/cert.pem read-timeout = "5s" ''
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.apiPortThe port where influxdb api listens
Type:
"integer"
Default:
8086
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.bindAddressAddress where influxdb listens
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.clusterConfigInfluxdb cluster configuration
Type:
"string"
Default:
'' protobuf_port = 8099 protobuf_timeout = "2s" protobuf_heartbeat = "200ms" protobuf_min_backoff = "1s" protobuf_max_backoff = "10s" write-buffer-size = 10000 max-response-buffer-size = 100 concurrent-shard-query-limit = 10 ''
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.dataDirData directory for influxd data files.
Type:
"path"
Default:
"/var/db/influxdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.enableWhether to enable the influxdb server
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.extraConfigExtra configuration options for influxdb
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.groupGroup under which influxdb runs
Type:
"string"
Default:
"influxdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.inputPluginsConfigConfiguration of influxdb extra plugins
Type:
"unspecified"
Default:
""
Example:
'' [input_plugins.graphite] enabled = true port = 2003 database = "graphite" ''
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.leveldbConfigInfluxdb leveldb configuration
Type:
"string"
Default:
'' max-open-files = 40 lru-cache-size = "200m" max-open-shards = 0 point-batch-size = 100 write-batch-size = 5000000 ''
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.raftConfigInfluxdb raft configuration
Type:
"string"
Default:
'' port = 8090 ''
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.shardingConfigInfluxdb sharding configuration
Type:
"string"
Default:
'' replication-factor = 1 [sharding.short-term] duration = "7d" split = 1 [sharding.long-term] duration = "30d" split = 1 ''
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.storageConfigInfluxdb raft configuration
Type:
"string"
Default:
'' write-buffer-size = 10000 ''
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.userUser account under which influxdb runs
Type:
"string"
Default:
"influxdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.influxdb.walConfigInfluxdb write-ahead log configuration
Type:
"string"
Default:
'' flush-after = 1000 bookmark-after = 1000 index-after = 1000 requests-per-logfile = 10000 ''
Declared by:
<nixpkgs/nixos/modules/services/databases/influxdb.nix>
|
services.iodined.clientStart iodine in client mode
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/iodined.nix>
|
services.iodined.domainDomain or subdomain of which nameservers point to us
Type:
"string"
Default:
""
Example:
"tunnel.mydomain.com"
Declared by:
<nixpkgs/nixos/modules/services/networking/iodined.nix>
|
services.iodined.enableEnable iodine, ip over dns daemon
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/iodined.nix>
|
services.iodined.extraConfigAdditional command line parameters
Type:
"string"
Default:
""
Example:
"-P mysecurepassword -l 192.168.1.10 -p 23"
Declared by:
<nixpkgs/nixos/modules/services/networking/iodined.nix>
|
services.iodined.ipAssigned ip address or ip range
Type:
"string"
Default:
""
Example:
"172.16.10.1/24"
Declared by:
<nixpkgs/nixos/modules/services/networking/iodined.nix>
|
services.ircdHybrid.adminEmailIRCD server administrator e-mail.
Type:
"unspecified"
Default:
"<bit-bucket@example.com>"
Example:
"<name@domain.tld>"
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.ircdHybrid.certificateIRCD server SSL certificate. There are some limitations - read manual.
Type:
"unspecified"
Default:
null
Example:
/root/certificates/irc.pem
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.ircdHybrid.descriptionIRCD server description.
Type:
"unspecified"
Default:
"Hybrid-7 IRC server."
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.ircdHybrid.enableEnable IRCD.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.ircdHybrid.extraIPsExtra IP's to bind.
Type:
"unspecified"
Default:
[
]
Example:
[
"127.0.0.1"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.ircdHybrid.extraPortExtra port to avoid filtering.
Type:
"unspecified"
Default:
"7117"
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.ircdHybrid.rsaKeyIRCD server RSA key.
Type:
"unspecified"
Default:
null
Example:
/root/certificates/irc.key
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.ircdHybrid.serverNameIRCD server name.
Type:
"unspecified"
Default:
"hades.arpa"
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.ircdHybrid.sidIRCD server unique ID in a net of servers.
Type:
"unspecified"
Default:
"0NL"
Declared by:
<nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix>
|
services.jboss.deployDirLocation of the deployment files
Type:
"unspecified"
Default:
"/nix/var/nix/profiles/default/server/default/deploy/"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/jboss/default.nix>
|
services.jboss.enableWhether to enable jboss
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/jboss/default.nix>
|
services.jboss.libUrlLocation where the shared library JARs are stored
Type:
"unspecified"
Default:
"file:///nix/var/nix/profiles/default/server/default/lib"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/jboss/default.nix>
|
services.jboss.logDirLocation of the logfile directory of JBoss
Type:
"unspecified"
Default:
"/var/log/jboss"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/jboss/default.nix>
|
services.jboss.serverDirLocation of the server instance files
Type:
"unspecified"
Default:
"/var/jboss/server"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/jboss/default.nix>
|
services.jboss.tempDirLocation where JBoss stores its temp files
Type:
"unspecified"
Default:
"/tmp"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/jboss/default.nix>
|
services.jboss.useJKWhether to use to connector to the Apache HTTP server
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/jboss/default.nix>
|
services.jboss.userUser account under which jboss runs.
Type:
"unspecified"
Default:
"nobody"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/jboss/default.nix>
|
services.jenkins.enableWhether to enable the jenkins continuous integration server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkins.environmentAdditional environment variables to be passed to the jenkins process. The environment will always include JENKINS_HOME.
Type:
"attribute set of strings"
Default:
{
NIX_REMOTE = "daemon";
}
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkins.extraGroupsList of extra groups that the "jenkins" user should be a part of.
Type:
"list of strings"
Default:
[
]
Example:
[
"wheel" "dialout"
]
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkins.extraOptionsAdditional command line arguments to pass to Jenkins.
Type:
"list of strings"
Default:
[
]
Example:
[
"--debug=9" "--httpListenAddress=localhost"
]
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkins.groupIf the default user "jenkins" is configured then this is the primary group of that user.
Type:
"string"
Default:
"jenkins"
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkins.homeThe path to use as JENKINS_HOME. If the default user "jenkins" is configured then this is the home of the "jenkins" user.
Type:
"path"
Default:
"/var/lib/jenkins"
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkins.packagesPackages to add to PATH for the jenkins process.
Type:
"list of derivations"
Default:
[
(build of stdenv) (build of git-minimal-2.3.5) (build of icedtea7-2.5.4) (build of ) (build of nix-1.8)
]
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkins.portSpecifies port number on which the jenkins HTTP interface listens. The default is 8080.
Type:
"integer"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkins.userUser the jenkins server should execute under.
Type:
"string"
Default:
"jenkins"
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix>
|
services.jenkinsSlave.enableIf true the system will be configured to work as a jenkins slave. If the system is also configured to work as a jenkins master then this has no effect. In progress: Currently only assures the jenkins user is configured.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/slave.nix>
|
services.jenkinsSlave.groupIf the default slave agent user "jenkins" is configured then this is the primary group of that user.
Type:
"string"
Default:
"jenkins"
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/slave.nix>
|
services.jenkinsSlave.homeThe path to use as JENKINS_HOME. If the default user "jenkins" is configured then this is the home of the "jenkins" user.
Type:
"path"
Default:
"/var/lib/jenkins"
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/slave.nix>
|
services.jenkinsSlave.userUser the jenkins slave agent should execute under.
Type:
"string"
Default:
"jenkins"
Declared by:
<nixpkgs/nixos/modules/services/continuous-integration/jenkins/slave.nix>
|
services.journald.consoleIf non-empty, write log messages to the specified TTY device.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
services.journald.enableHttpGatewayWhether to enable the HTTP gateway to the journal.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
services.journald.extraConfigExtra config options for systemd-journald. See man journald.conf for available options.
Type:
"string"
Default:
""
Example:
"Storage=volatile"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
services.journald.rateLimitBurstConfigures the rate limiting burst limit (number of messages per interval) that is applied to all messages generated on the system. This rate limiting is applied per-service, so that two services which log do not interfere with each other's limit.
Type:
"integer"
Default:
100
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
services.journald.rateLimitIntervalConfigures the rate limiting interval that is applied to all messages generated on the system. This rate limiting is applied per-service, so that two services which log do not interfere with each other's limit. The value may be specified in the following units: s, min, h, ms, us. To turn off any kind of rate limiting, set either value to 0.
Type:
"string"
Default:
"10s"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
services.kerberos_server.enableEnable the kerberos authentification server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/system/kerberos.nix>
|
services.kippo.enableEnable the kippo honeypot ssh server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/kippo.nix>
|
services.kippo.extraConfigExtra verbatim configuration added to the end of kippo.cfg.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/kippo.nix>
|
services.kippo.hostnameHostname for kippo to present to SSH login
Type:
"string"
Default:
"nas3"
Declared by:
<nixpkgs/nixos/modules/services/networking/kippo.nix>
|
services.kippo.logPathPath of log files needed for operation and configuration.
Type:
"string"
Default:
"/var/log/kippo"
Declared by:
<nixpkgs/nixos/modules/services/networking/kippo.nix>
|
services.kippo.pidPathPath of pid files needed for operation.
Type:
"string"
Default:
"/run/kippo"
Declared by:
<nixpkgs/nixos/modules/services/networking/kippo.nix>
|
services.kippo.portTCP port number for kippo to bind to.
Type:
"integer"
Default:
2222
Declared by:
<nixpkgs/nixos/modules/services/networking/kippo.nix>
|
services.kippo.varPathPath of read/write files needed for operation and configuration.
Type:
"string"
Default:
"/var/lib/kippo"
Declared by:
<nixpkgs/nixos/modules/services/networking/kippo.nix>
|
services.klogd.enableWhether to enable klogd, the kernel log message processing daemon. Since systemd handles logging of kernel messages on Linux 3.5 and later, this is only useful if you're running an older kernel.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/klogd.nix>
|
services.kmscon.enableUse kmscon as the virtual console instead of gettys. kmscon is a kms/dri-based userspace virtual terminal implementation. It supports a richer feature set than the standard linux console VT, including full unicode support, and when the video card supports drm should be much faster.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/ttys/kmscon.nix>
|
services.kmscon.extraConfigExtra contents of the kmscon.conf file.
Type:
"string"
Default:
""
Example:
"font-size=14"
Declared by:
<nixpkgs/nixos/modules/services/ttys/kmscon.nix>
|
services.kmscon.hwRenderWhether to use 3D hardware acceleration to render the console.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/ttys/kmscon.nix>
|
services.kubernetes.apiserver.addressKubernetes apiserver listening address.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.allowPrivilegedWhether to allow privileged containers on kubernetes.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.authorizationModeKubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC). See https://github.com/GoogleCloudPlatform/kubernetes/blob/master/docs/authorization.md
Type:
"one of AlwaysAllow, AlwaysDeny, ABAC"
Default:
"AlwaysAllow"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.authorizationPolicyKubernetes apiserver authorization policy file. See https://github.com/GoogleCloudPlatform/kubernetes/blob/master/docs/authorization.md
Type:
"list of attribute sets"
Default:
[
]
Example:
[
{user = "admin";}
{user = "scheduler"; readonly = true; kind= "pods";}
{user = "scheduler"; kind = "bindings";}
{user = "kubelet"; readonly = true; kind = "bindings";}
{user = "kubelet"; kind = "events";}
{user= "alice"; ns = "projectCaribou";}
{user = "bob"; readonly = true; ns = "projectCaribou";}
]
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.enableWhether to enable kubernetes apiserver.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.extraOptsKubernetes apiserver extra command line options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.portKubernets apiserver listening port.
Type:
"integer"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.portalNetKubernetes CIDR notation IP range from which to assign portal IPs
Type:
"string"
Default:
"10.10.10.10/16"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.publicAddressKubernetes apiserver public listening address used for read only and secure port.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.readOnlyPortKubernets apiserver read-only port.
Type:
"integer"
Default:
7080
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.securePortKubernetes apiserver secure port.
Type:
"integer"
Default:
6443
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.tlsCertFileKubernetes apiserver certificate file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.tlsPrivateKeyFileKubernetes apiserver private key file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.apiserver.tokenAuthKubernetes apiserver token authentication file. See https://github.com/GoogleCloudPlatform/kubernetes/blob/master/docs/authentication.md
Type:
"attribute set of strings"
Default:
{
}
Example:
{
alice = "abc123";
bob = "xyz987";
}
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.controllerManager.addressKubernetes controller manager listening address.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.controllerManager.enableWhether to enable kubernetes controller manager.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.controllerManager.extraOptsKubernetes controller extra command line options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.controllerManager.machinesKubernetes controller list of machines to schedule to schedule onto
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.controllerManager.masterKubernetes apiserver address
Type:
"string"
Default:
"127.0.0.1:8080"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.controllerManager.portKubernets controller manager listening port.
Type:
"integer"
Default:
10252
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.dataDirKubernetes root directory for managing kubelet files.
Type:
"path"
Default:
"/var/lib/kubernetes"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.dockerCfgKubernetes contents of dockercfg file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.etcdServersKubernetes list of etcd servers to watch.
Type:
"list of strings"
Default:
[
"127.0.0.1:4001"
]
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.addressKubernetes kubelet info server listening address.
Type:
"string"
Default:
"0.0.0.0"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.allowPrivilegedWhether to allow kubernetes containers to request privileged mode.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.apiServersKubernetes kubelet list of Kubernetes API servers for publishing events, and reading pods and services.
Type:
"list of strings"
Default:
[
"127.0.0.1:8080"
]
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.cadvisorPortKubernetes kubelet local cadvisor port.
Type:
"integer"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.clusterDnsUse alternative dns.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.clusterDomainUse alternative domain.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.enableWhether to enable kubernetes kubelet.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.extraOptsKubernetes kubelet extra command line options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.hostnameKubernetes kubelet hostname override
Type:
"string"
Default:
"nixos"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.kubelet.portKubernets kubelet info server listening port.
Type:
"integer"
Default:
10250
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.proxy.addressKubernetes proxy listening address.
Type:
"string"
Default:
"0.0.0.0"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.proxy.enableWhether to enable kubernetes proxy.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.proxy.extraOptsKubernetes proxy extra command line options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.rolesKubernetes role that this machine should take. Master role will enable etcd, apiserver, scheduler and controller manager services. Node role will enable etcd, docker, kubelet and proxy services.
Type:
"list of one of master, nodes"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.scheduler.addressKubernetes scheduler listening address.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.scheduler.enableWhether to enable kubernetes scheduler.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.scheduler.extraOptsKubernetes scheduler extra command line options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.scheduler.masterKubernetes apiserver address
Type:
"string"
Default:
"127.0.0.1:8080"
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.scheduler.portKubernets scheduler listening port.
Type:
"integer"
Default:
10251
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.kubernetes.verboseKubernetes enable verbose mode for debugging
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/kubernetes.nix>
|
services.lighttpd.cgit.configTextVerbatim contents of the cgit runtime configuration file. Documentation (with cgitrc example file) is available in "man cgitrc". Or online: http://git.zx2c4.com/cgit/tree/cgitrc.5.txt
Type:
"string"
Default:
""
Example:
'' cache-size=1000 scan-path=/srv/git ''
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/cgit.nix>
|
services.lighttpd.cgit.enableIf true, enable cgit (fast web interface for git repositories) as a sub-service in lighttpd. cgit will be accessible at http://yourserver/cgit
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/cgit.nix>
|
services.lighttpd.configTextOverridable config file contents to use for lighttpd. By default, use the contents automatically generated by NixOS.
Type:
"string"
Default:
""
Example:
"...verbatim config file contents..."
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix>
|
services.lighttpd.document-rootDocument-root of the web server. Must be readable by the "lighttpd" user.
Type:
"path"
Default:
"/srv/www"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix>
|
services.lighttpd.enableEnable the lighttpd web server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix>
|
services.lighttpd.enableModulesList of lighttpd modules to enable. Sub-services take care of
enabling modules as needed, so this option is mainly for when you
want to add custom stuff to
services.lighttpd.extraConfig that depends on a
certain module.
Type:
"list of strings"
Default:
[
]
Example:
[
"mod_cgi" "mod_status"
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix>
|
services.lighttpd.extraConfigThese configuration lines will be appended to the generated lighttpd
config file. Note that this mechanism does not work when the manual
configText option is used.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix>
|
services.lighttpd.gitweb.enableIf true, enable gitweb in lighttpd. Access it at http://yourserver/gitweb
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/gitweb.nix>
|
services.lighttpd.gitweb.extraConfigVerbatim configuration text appended to the generated gitweb.conf file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/gitweb.nix>
|
services.lighttpd.gitweb.projectrootPath to git projects (bare repositories) that should be served by gitweb. Must not end with a slash.
Type:
"path"
Default:
"/srv/git"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/gitweb.nix>
|
services.lighttpd.mod_statusShow server status overview at /server-status, statistics at /server-statistics and list of loaded modules at /server-config.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix>
|
services.lighttpd.mod_userdirIf true, requests in the form /~user/page.html are rewritten to take the file public_html/page.html from the home directory of the user.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix>
|
services.lighttpd.portTCP port number for lighttpd to bind to.
Type:
"integer"
Default:
80
Declared by:
<nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix>
|
services.liquidsoap.streamsSet of Liquidsoap streams to start, one systemd service per stream.
Type:
"attribute set of path or strings"
Default:
{
}
Example:
{
myStream1 = "/etc/liquidsoap/myStream1.liq"; myStream2 = ./myStream2.liq; myStream3 = "out(playlist("/srv/music/"))";
}
Declared by:
<nixpkgs/nixos/modules/services/audio/liquidsoap.nix>
|
services.locate.enableIf enabled, NixOS will periodically update the database of files used by the locate command.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/misc/locate.nix>
|
services.locate.extraFlagsExtra flags to append to updatedb.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/misc/locate.nix>
|
services.locate.localuserThe user to search non-network directories as, using su.
Type:
"string"
Default:
"nobody"
Declared by:
<nixpkgs/nixos/modules/misc/locate.nix>
|
services.locate.outputThe database file to build.
Type:
"path"
Default:
"/var/cache/locatedb"
Declared by:
<nixpkgs/nixos/modules/misc/locate.nix>
|
services.locate.periodThis option defines (in the format used by cron) when the locate database is updated. The default is to update at 02:15 at night every day.
Type:
"string"
Default:
"15 02 * * *"
Declared by:
<nixpkgs/nixos/modules/misc/locate.nix>
|
services.logcheck.configConfig options that you would like in logcheck.conf.
Type:
"string"
Default:
"FQDN=1"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.enableEnable the logcheck cron job.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.extraGroupsExtra groups for the logcheck user, for example to be able to use sendmail, or to access certain log files.
Type:
"list of strings"
Default:
[
]
Example:
[
"postdrop" "mongodb"
]
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.extraRulesDirsDirectories with extra rules.
Type:
"list of paths"
Default:
[
]
Example:
"/etc/logcheck"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.filesWhich log files to check.
Type:
"list of paths"
Default:
[
"/var/log/messages"
]
Example:
[
"/var/log/messages" "/var/log/mail"
]
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignoreThis option defines extra ignore rules.
Type:
"list or attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignore.<name?>.levelSet the logcheck level. Either "workstation", "server", or "paranoid".
Type:
"string"
Default:
"server"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignore.<name?>.regexRegex specifying which log lines to ignore.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignoreCronThis option defines extra ignore rules for cronjobs.
Type:
"list or attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignoreCron.<name?>.cmdlineCommand line for the cron job. Will be turned into a regex for the logcheck ignore rule.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignoreCron.<name?>.levelSet the logcheck level. Either "workstation", "server", or "paranoid".
Type:
"string"
Default:
"server"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignoreCron.<name?>.regexRegex specifying which log lines to ignore.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignoreCron.<name?>.timeArgs"min hr dom mon dow" crontab time args, to auto-create a cronjob too. Leave at null to not do this and just add a logcheck ignore rule.
Type:
"null or string"
Default:
null
Example:
"02 06 * * *"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.ignoreCron.<name?>.userUser that runs the cronjob.
Type:
"string"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.levelSet the logcheck level. Either "workstation", "server", or "paranoid".
Type:
"string"
Default:
"server"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.mailToEmail address to send reports to.
Type:
"string"
Default:
"root"
Example:
"you@domain.com"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.timeOfDayTime of day to run logcheck. A logcheck will be scheduled at xx:02 each day. Leave default (*) to run every hour. Of course when nothing special was logged, logcheck will be silent.
Type:
"string"
Default:
"*"
Example:
"6"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logcheck.userUsername for the logcheck user.
Type:
"string"
Default:
"logcheck"
Declared by:
<nixpkgs/nixos/modules/services/logging/logcheck.nix>
|
services.logind.extraConfigExtra config options for systemd-logind. See man logind.conf for available options.
Type:
"string"
Default:
""
Example:
"HandleLidSwitch=ignore"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
services.logrotate.configThe contents of the logrotate config file
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/logging/logrotate.nix>
|
services.logrotate.enableEnable the logrotate cron job
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/logrotate.nix>
|
services.logstash.addressAddress on which to start webserver.
Type:
"string"
Default:
"0.0.0.0"
Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.enableEnable logstash.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.enableWebEnable the logstash web interface.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.filterConfiglogstash filter configuration.
Type:
"string"
Default:
"noop {}"
Example:
''
if [type] == "syslog" {
# Keep only relevant systemd fields
# http://www.freedesktop.org/software/systemd/man/systemd.journal-fields.html
prune {
whitelist_names => [
"type", "@timestamp", "@version",
"MESSAGE", "PRIORITY", "SYSLOG_FACILITY",
]
}
}
''Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.filterWorkersThe quantity of filter workers to run.
Type:
"integer"
Default:
1
Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.inputConfigLogstash input configuration.
Type:
"string"
Default:
''stdin { type => "example" }''
Example:
''
# Read from journal
pipe {
command => "/nix/store/d0468c86p8akn438g1dcrg8lc93pk9sd-systemd-217/bin/journalctl -f -o json"
type => "syslog" codec => json {}
}
''Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.logLevelLogging verbosity level.
Type:
"one of debug, info, warn, error, fatal"
Default:
"warn"
Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.outputConfigLogstash output configuration.
Type:
"string"
Default:
''stdout { debug => true debug_format => "json"}''
Example:
''
redis { host => "localhost" data_type => "list" key => "logstash" codec => json }
elasticsearch { embedded => true }
''Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.pluginsThe paths to find other logstash plugins in.
Type:
"list of paths"
Default:
[
]
Example:
[ pkgs.logstash-contrib ]
Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.portPort on which to start webserver.
Type:
"string"
Default:
"9292"
Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.logstash.watchdogTimeoutSet watchdog timeout value in seconds.
Type:
"integer"
Default:
10
Declared by:
<nixpkgs/nixos/modules/services/logging/logstash.nix>
|
services.lshd.enableWhether to enable the GNU lshd SSH2 daemon, which allows secure remote login.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.hostKeyPath to the server's private key. Note that this key must have been created, e.g., using "lsh-keygen --server | lsh-writekey --server", so that you can run lshd.
Type:
"unspecified"
Default:
"/etc/lsh/host-key"
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.interfacesList of network interfaces where listening for connections. When providing the empty list, `[]', lshd listens on all network interfaces.
Type:
"unspecified"
Default:
[
]
Example:
[
"localhost" "1.2.3.4:443"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.loginShellIf non-null, override the default login shell with the specified value.
Type:
"unspecified"
Default:
null
Example:
"/nix/store/xyz-bash-10.0/bin/bash10"
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.passwordAuthenticationWhether to enable password authentication.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.portNumberThe port on which to listen for connections.
Type:
"unspecified"
Default:
22
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.publicKeyAuthenticationWhether to enable public key authentication.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.rootLoginWhether to enable remote root login.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.srpKeyExchangeWhether to enable SRP key exchange and user authentication.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.subsystemsList of subsystem-path pairs, where the head of the pair denotes the subsystem name, and the tail denotes the path to an executable implementing it.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.syslogWhether to enable syslog output.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.tcpForwardingWhether to enable TCP/IP forwarding.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.lshd.x11ForwardingWhether to enable X11 forwarding.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/lshd.nix>
|
services.mail.freepopsd.bindBind over an IPv4 address instead of any.
Type:
"string"
Default:
"0.0.0.0"
Declared by:
<nixpkgs/nixos/modules/services/mail/freepops.nix>
|
services.mail.freepopsd.enableEnables Freepops, a POP3 webmail wrapper.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/freepops.nix>
|
services.mail.freepopsd.logFileFilename of the log file or syslog to rely on the logging daemon.
Type:
"string"
Default:
"/var/log/freepopsd"
Example:
"syslog"
Declared by:
<nixpkgs/nixos/modules/services/mail/freepops.nix>
|
services.mail.freepopsd.portPort on which the pop server will listen.
Type:
"integer"
Default:
2000
Declared by:
<nixpkgs/nixos/modules/services/mail/freepops.nix>
|
services.mail.freepopsd.suid.groupGroup under which freepopsd will be after binding the port.
Type:
"string"
Default:
"nogroup"
Declared by:
<nixpkgs/nixos/modules/services/mail/freepops.nix>
|
services.mail.freepopsd.suid.userUser name under which freepopsd will be after binding the port.
Type:
"string"
Default:
"nobody"
Declared by:
<nixpkgs/nixos/modules/services/mail/freepops.nix>
|
services.mail.freepopsd.threadsMax simultaneous connections.
Type:
"integer"
Default:
5
Declared by:
<nixpkgs/nixos/modules/services/mail/freepops.nix>
|
services.mail.sendmailSetuidWrapperConfiguration for the sendmail setuid wrwapper (like an element of security.setuidOwners)";
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/mail/mail.nix>
|
services.mailpile.enableWhether to enable Mailpile the mail client.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/mailpile.nix>
|
services.mailpile.hostnameListen to this hostname or ip.
Type:
"unspecified"
Default:
"localhost"
Declared by:
<nixpkgs/nixos/modules/services/networking/mailpile.nix>
|
services.mailpile.portListen on this port.
Type:
"unspecified"
Default:
"33411"
Declared by:
<nixpkgs/nixos/modules/services/networking/mailpile.nix>
|
services.marathon.enableWhether to enable the marathon mesos framework.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/scheduling/marathon.nix>
|
services.marathon.httpPortMarathon listening port
Type:
"integer"
Default:
8080
Declared by:
<nixpkgs/nixos/modules/services/scheduling/marathon.nix>
|
services.marathon.masterMarathon mesos master zookeeper address
Type:
"string"
Default:
"zk://localhost:2181/mesos"
Declared by:
<nixpkgs/nixos/modules/services/scheduling/marathon.nix>
|
services.marathon.zookeeperHostsMarathon mesos zookepper addresses
Type:
"list of strings"
Default:
[
"localhost:2181"
]
Declared by:
<nixpkgs/nixos/modules/services/scheduling/marathon.nix>
|
services.mediatomb.customCfgAllow mediatomb to create and use its own config file inside /var/lib/mediatomb.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.dataDirThe directory where mediatomb stores its state, data, etc.
Type:
"path"
Default:
"/var/lib/mediatomb"
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.dsmSupportWhether to enable D-Link DSM 320 specific tweaks. WARNING: incompatible with ps3 support.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.enableWhether to enable the mediatomb DLNA server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.groupGroup account under which mediatomb runs.
Type:
"unspecified"
Default:
"mediatomb"
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.portThe network port to listen on.
Type:
"unspecified"
Default:
49152
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.ps3SupportWhether to enable ps3 specific tweaks. WARNING: incompatible with DSM 320 support.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.serverNameHow to identify the server on the network.
Type:
"string"
Default:
"mediatomb"
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.tg100SupportWhether to enable Telegent TG100 specific tweaks.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.transcodingWhether to enable transcoding.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.userUser account under which mediatomb runs.
Type:
"unspecified"
Default:
"mediatomb"
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.mediatomb.uuidA unique (on your network) to identify the server by.
Type:
"unspecified"
Default:
"fdfc8a4e-a3ad-4c1d-b43d-a2eedb03a687"
Declared by:
<nixpkgs/nixos/modules/services/misc/mediatomb.nix>
|
services.memcached.enableWhether to enable Memcached.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/memcached.nix>
|
services.memcached.extraOptionsA list of extra options that will be added as a suffix when running memcached
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/databases/memcached.nix>
|
services.memcached.listenThe IP address to bind to
Type:
"unspecified"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/databases/memcached.nix>
|
services.memcached.maxConnectionsThe maximum number of simultaneous connections
Type:
"unspecified"
Default:
1024
Declared by:
<nixpkgs/nixos/modules/services/databases/memcached.nix>
|
services.memcached.maxMemoryThe maximum amount of memory to use for storage, in megabytes.
Type:
"unspecified"
Default:
64
Declared by:
<nixpkgs/nixos/modules/services/databases/memcached.nix>
|
services.memcached.portThe port to bind to
Type:
"unspecified"
Default:
11211
Declared by:
<nixpkgs/nixos/modules/services/databases/memcached.nix>
|
services.memcached.socketUnix socket path to listen on. Setting this will disable network support
Type:
"unspecified"
Default:
""
Example:
"/var/run/memcached"
Declared by:
<nixpkgs/nixos/modules/services/databases/memcached.nix>
|
services.memcached.userThe user to run Memcached as
Type:
"unspecified"
Default:
"memcached"
Declared by:
<nixpkgs/nixos/modules/services/databases/memcached.nix>
|
services.mesos.master.enableWhether to enable the Mesos Master.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-master.nix>
|
services.mesos.master.extraCmdLineOptionsExtra command line options for Mesos Master. See https://mesos.apache.org/documentation/latest/configuration/
Type:
"list of strings"
Default:
[
""
]
Example:
[
"--credentials=VALUE"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-master.nix>
|
services.mesos.master.logLevelThe logging level used. Possible values: 'INFO', 'WARNING', 'ERROR'
Type:
"string"
Default:
"INFO"
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-master.nix>
|
services.mesos.master.portMesos Master port
Type:
"integer"
Default:
5050
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-master.nix>
|
services.mesos.master.quorumThe size of the quorum of replicas when using 'replicated_log' based registry. It is imperative to set this value to be a majority of masters i.e., quorum > (number of masters)/2. If 0 will fall back to --registry=in_memory.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-master.nix>
|
services.mesos.master.workDirThe Mesos work directory.
Type:
"string"
Default:
"/var/lib/mesos/master"
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-master.nix>
|
services.mesos.master.zkZooKeeper URL (used for leader election amongst masters). May be one of: zk://host1:port1,host2:port2,.../mesos zk://username:password@host1:port1,host2:port2,.../mesos
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-master.nix>
|
services.mesos.slave.attributesMachine attributes for the slave instance. Use caution when changing this; you may need to manually reset slave metadata before the slave can re-register.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
host = "aabc123"; os = "nixos"; rack = "aa";
}
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-slave.nix>
|
services.mesos.slave.enableWhether to enable the Mesos Slave.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-slave.nix>
|
services.mesos.slave.extraCmdLineOptionsExtra command line options for Mesos Slave. See https://mesos.apache.org/documentation/latest/configuration/
Type:
"list of strings"
Default:
[
""
]
Example:
[
"--gc_delay=3days"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-slave.nix>
|
services.mesos.slave.logLevelThe logging level used. Possible values: 'INFO', 'WARNING', 'ERROR'
Type:
"string"
Default:
"INFO"
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-slave.nix>
|
services.mesos.slave.masterMay be one of: zk://host1:port1,host2:port2,.../path zk://username:password@host1:port1,host2:port2,.../path
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-slave.nix>
|
services.mesos.slave.portMesos Slave port
Type:
"integer"
Default:
5051
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-slave.nix>
|
services.mesos.slave.withHadoopAdd the HADOOP_HOME to the slave.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-slave.nix>
|
services.mesos.slave.workDirThe Mesos work directory.
Type:
"string"
Default:
"/var/lib/mesos/slave"
Declared by:
<nixpkgs/nixos/modules/services/misc/mesos-slave.nix>
|
services.minecraft-server.dataDirDirectory to store minecraft database and other state/data files.
Type:
"path"
Default:
"/var/lib/minecraft"
Declared by:
<nixpkgs/nixos/modules/services/games/minecraft-server.nix>
|
services.minecraft-server.enableIf enabled, start a Minecraft Server. The listening port for
the server is always 25565. The server
data will be loaded from and saved to
/var/lib/minecraft.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/games/minecraft-server.nix>
|
services.minecraft-server.jvmOptsJVM options for the Minecraft Service.
Type:
"string"
Default:
"-Xmx2048M -Xms2048M"
Declared by:
<nixpkgs/nixos/modules/services/games/minecraft-server.nix>
|
services.minecraft-server.openFirewallWhether to open ports in the firewall (if enabled) for the server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/games/minecraft-server.nix>
|
services.minetest-server.configPathPath to the config to use. If set to null, the config of the running user will be used: `~/.minetest/minetest.conf`.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/games/minetest-server.nix>
|
services.minetest-server.enableIf enabled, starts a Minetest Server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/games/minetest-server.nix>
|
services.minetest-server.gameIdId of the game to use. To list available games run `minetestserver --gameid list`. If only one game exists, this option can be null.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/games/minetest-server.nix>
|
services.minetest-server.logPathPath to logfile for logging. If set to null, logging will be output to stdout which means all output will be catched by systemd.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/games/minetest-server.nix>
|
services.minetest-server.portPort number to bind to. If set to null, the default 30000 will be used.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/games/minetest-server.nix>
|
services.minetest-server.worldName of the world to use. To list available worlds run `minetestserver --world list`. If only one world exists, this option can be null.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/games/minetest-server.nix>
|
services.mingetty.greetingLineWelcome line printed by mingetty.
Type:
"string"
Default:
''<<< Welcome to NixOS 15.05pre56789.gfedcba (\m) - \l >>>''
Declared by:
<nixpkgs/nixos/modules/services/ttys/agetty.nix>
|
services.mingetty.helpLineHelp line printed by mingetty below the welcome line. Used by the installation CD to give some hints on how to proceed.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/ttys/agetty.nix>
|
services.mingetty.serialSpeedBitrates to allow for agetty's listening on serial ports. Listing more bitrates gives more interoperability but at the cost of long delays for getting a sync on the line.
Type:
"list of integers"
Default:
[
115200 57600 38400 9600
]
Example:
[
38400 9600
]
Declared by:
<nixpkgs/nixos/modules/services/ttys/agetty.nix>
|
services.minidlna.configThe contents of MiniDLNA's configuration file.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/minidlna.nix>
|
services.minidlna.enableWhether to enable MiniDLNA, a simple DLNA server. It serves media files such as video and music to DLNA client devices such as televisions and media players.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/minidlna.nix>
|
services.minidlna.mediaDirsDirectories to be scanned for media files. The prefixes
A,, V, and
P, restrict a directory to audio, video
or image files. The directories must be accessible to the
minidlna user account.
Type:
"list of strings"
Default:
[
]
Example:
[
"/data/media" "V,/home/alice/video"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/minidlna.nix>
|
services.mlmmj.enableEnable mlmmj
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/mlmmj.nix>
|
services.mlmmj.groupmailinglist local group
Type:
"string"
Default:
"mlmmj"
Declared by:
<nixpkgs/nixos/modules/services/mail/mlmmj.nix>
|
services.mlmmj.listDomainSet the mailing list domain
Type:
"string"
Default:
"localhost"
Declared by:
<nixpkgs/nixos/modules/services/mail/mlmmj.nix>
|
services.mlmmj.mailListsThe collection of hosted maillists
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/mail/mlmmj.nix>
|
services.mlmmj.usermailinglist local user
Type:
"string"
Default:
"mlmmj"
Declared by:
<nixpkgs/nixos/modules/services/mail/mlmmj.nix>
|
services.monetdb.dbfarmDirSpecifies location of Monetdb dbfarm (keeps database and auxiliary files).
Type:
"path"
Default:
"/var/lib/monetdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/monetdb.nix>
|
services.monetdb.enableWhether to enable MonetDB database server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/monetdb.nix>
|
services.monetdb.packageMonetDB package to use.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/services/databases/monetdb.nix>
|
services.monetdb.portPort to listen on.
Type:
"unspecified"
Default:
"50000"
Example:
"50000"
Declared by:
<nixpkgs/nixos/modules/services/databases/monetdb.nix>
|
services.mongodb.bind_ipIP to bind to
Type:
"unspecified"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/databases/mongodb.nix>
|
services.mongodb.dbpathLocation where MongoDB stores its files
Type:
"unspecified"
Default:
"/var/db/mongodb"
Declared by:
<nixpkgs/nixos/modules/services/databases/mongodb.nix>
|
services.mongodb.enableWhether to enable the MongoDB server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/mongodb.nix>
|
services.mongodb.extraConfigMongoDB extra configuration
Type:
"unspecified"
Default:
""
Example:
'' nojournal = true ''
Declared by:
<nixpkgs/nixos/modules/services/databases/mongodb.nix>
|
services.mongodb.pidFileLocation of MongoDB pid file
Type:
"unspecified"
Default:
"/var/run/mongodb.pid"
Declared by:
<nixpkgs/nixos/modules/services/databases/mongodb.nix>
|
services.mongodb.quietquieter output
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/mongodb.nix>
|
services.mongodb.replSetNameIf this instance is part of a replica set, set its name here. Otherwise, leave empty to run as single node.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/mongodb.nix>
|
services.mongodb.userUser account under which MongoDB runs
Type:
"unspecified"
Default:
"mongodb"
Declared by:
<nixpkgs/nixos/modules/services/databases/mongodb.nix>
|
services.monit.configmonit.conf content
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/monit.nix>
|
services.monit.enableWhether to run Monit system watcher.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/monit.nix>
|
services.monit.startOnWhat Monit supposes to be already present
Type:
"unspecified"
Default:
"started network-interfaces"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/monit.nix>
|
services.mopidy.configurationThe configuration that Mopidy should use.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/audio/mopidy.nix>
|
services.mopidy.dataDirThe directory where Mopidy stores its state.
Type:
"string"
Default:
"/var/lib/mopidy"
Declared by:
<nixpkgs/nixos/modules/services/audio/mopidy.nix>
|
services.mopidy.enableWhether to enable Mopidy, a music player daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/audio/mopidy.nix>
|
services.mopidy.extensionPackagesMopidy extensions that should be loaded by the service.
Type:
"list of derivations"
Default:
[
]
Example:
[ pkgs.mopidy-spotify ]
Declared by:
<nixpkgs/nixos/modules/services/audio/mopidy.nix>
|
services.mopidy.extraConfigFilesExtra config file read by Mopidy when the service starts. Later files in the list overrides earlier configuration.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/audio/mopidy.nix>
|
services.mpd.dataDirThe directory where MPD stores its state, tag cache, playlists etc.
Type:
"unspecified"
Default:
"/var/lib/mpd"
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mpd.dbFileThe path to MPD's database.
Type:
"string"
Default:
"/var/lib/mpd/tag_cache"
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mpd.enableWhether to enable MPD, the music player daemon.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mpd.extraConfigExtra directives added to to the end of MPD's configuration file, mpd.conf. Basic configuration like file location and uid/gid is added automatically to the beginning of the file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mpd.groupGroup account under which MPD runs.
Type:
"unspecified"
Default:
"mpd"
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mpd.musicDirectoryThe directory where mpd reads music from.
Type:
"unspecified"
Default:
"/var/lib/mpd/music"
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mpd.network.hostThis setting sets the address for the daemon to listen on. Careful attention should be paid if this is assigned to anything other then the default, any. This setting can deny access to control of the daemon.
Type:
"unspecified"
Default:
"any"
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mpd.network.portThis setting is the TCP port that is desired for the daemon to get assigned to.
Type:
"unspecified"
Default:
6600
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mpd.userUser account under which MPD runs.
Type:
"unspecified"
Default:
"mpd"
Declared by:
<nixpkgs/nixos/modules/services/audio/mpd.nix>
|
services.mstpd.enableWhether to enable the multiple spanning tree protocol daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/mstpd.nix>
|
services.munge.enableWhether to enable munge service.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/security/munge.nix>
|
services.munge.passwordThe path to a daemon's secret key.
Type:
"string"
Default:
"/etc/munge/munge.key"
Declared by:
<nixpkgs/nixos/modules/services/security/munge.nix>
|
services.munin-cron.enableEnable munin-cron. Takes care of all heavy lifting to collect data from
nodes and draws graphs to html. Runs munin-update, munin-limits,
munin-graphs and munin-html in that order.
HTML output is in /var/www/munin/, configure your
favourite webserver to serve static files.
Type:
"unspecified"
Default:
false
Example:
services = {
munin-node.enable = true;
munin-cron = {
enable = true;
hosts = ''
[${config.networking.hostName}]
address localhost
'';
extraGlobalConfig = ''
contact.email.command mail -s "Munin notification for ${var:host}" someone@example.com
'';
};
};
Declared by:
<nixpkgs/nixos/modules/services/monitoring/munin.nix>
|
services.munin-cron.extraGlobalConfigmunin.conf extra global configuration.
See http://munin-monitoring.org/wiki/munin.conf.
Useful to setup notifications, see
http://munin-monitoring.org/wiki/HowToContact
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/munin.nix>
|
services.munin-cron.hostsDefinitions of hosts of nodes to collect data from. Needs at least one hosts for cron to succeed. See http://munin-monitoring.org/wiki/munin.conf
Type:
"unspecified"
Example:
''
[''${config.networking.hostName}]
address localhost
''Declared by:
<nixpkgs/nixos/modules/services/monitoring/munin.nix>
|
services.munin-node.enableEnable Munin Node agent. Munin node listens on 0.0.0.0 and by default accepts connections only from 127.0.0.1 for security reasons. See http://munin-monitoring.org/wiki/munin-node.conf.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/munin.nix>
|
services.munin-node.extraConfigmunin-node.conf extra configuration. See
http://munin-monitoring.org/wiki/munin-node.conf
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/munin.nix>
|
services.murmur.allowHtmlAllow HTML in client messages, comments, and channel descriptions.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.autobanAttemptsNumber of attempts a client is allowed to make in
autobanTimeframe seconds, before being
banned for autobanTime.
Type:
"integer"
Default:
10
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.autobanTimeThe amount of time an IP ban lasts (in seconds).
Type:
"integer"
Default:
300
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.autobanTimeframeTimeframe in which a client can connect without being banned for repeated attempts (in seconds).
Type:
"integer"
Default:
120
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.bandwidthMaximum bandwidth (in bits per second) that clients may send speech at.
Type:
"integer"
Default:
72000
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.bonjourEnable Bonjour auto-discovery, which allows clients over your LAN to automatically discover Murmur servers.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.clientCertRequiredRequire clients to authenticate via certificates.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.enableIf enabled, start the Murmur Service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.hostNameHost to bind to. Defaults binding on all addresses.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.imgMsgLengthMax length of image messages. Set 0 for no limit.
Type:
"integer"
Default:
131072
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.logDaysHow long to store RPC logs for in the database. Set 0 to keep logs forever, or -1 to disable DB logging.
Type:
"integer"
Default:
31
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.passwordRequired password to join server, if specified.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.pidfilePath to PID file for Murmur daemon.
Type:
"path"
Default:
"/tmp/murmurd.pid"
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.portPorts to bind to (UDP and TCP).
Type:
"integer"
Default:
64738
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.registerHostnameDNS hostname where your server can be reached. This is only needed if you want your server to be accessed by its hostname and not IP - but the name *must* resolve on the internet properly.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.registerNamePublic server registration name, and also the name of the Root channel. Even if you don't publicly register your server, you probably still want to set this.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.registerPasswordPublic server registry password, used authenticate your server to the registry to prevent impersonation; required for subsequent registry updates.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.registerUrlURL website for your server.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.sendVersionSend Murmur version in UDP response.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.sslCertPath to your SSL certificate.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.sslKeyPath to your SSL key.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.textMsgLengthMax length of text messages. Set 0 for no limit.
Type:
"integer"
Default:
5000
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.usersMaximum number of concurrent clients allowed.
Type:
"integer"
Default:
100
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.murmur.welcomeWelcome message for connected clients.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/murmur.nix>
|
services.mysql.dataDirLocation where MySQL stores its table files
Type:
"unspecified"
Default:
"/var/mysql"
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.enableWhether to enable the MySQL server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.extraOptionsProvide extra options to the MySQL configuration file.
Please note, that these options are added to the
[mysqld] section so you don't need to explicitly
state it again.
Type:
"unspecified"
Default:
""
Example:
'' key_buffer_size = 6G table_cache = 1600 log-error = /var/log/mysql_err.log ''
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.initialDatabasesList of database names and their initial schemas that should be used to create databases on the first startup of MySQL
Type:
"unspecified"
Default:
[
]
Example:
[
{
name = "foodatabase"; schema = ./foodatabase.sql;
}
{
name = "bardatabase"; schema = ./bardatabase.sql;
}
]
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.initialScriptA file containing SQL statements to be executed on the first startup. Can be used for granting certain permissions on the database
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.pidDirLocation of the file which stores the PID of the MySQL server
Type:
"unspecified"
Default:
"/run/mysqld"
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.portPort of MySQL
Type:
"unspecified"
Default:
"3306"
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.replication.masterHostHostname of the MySQL master server
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.replication.masterPasswordPassword of the MySQL replication user
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.replication.masterPortPort number on which the MySQL master server runs
Type:
"unspecified"
Default:
3306
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.replication.masterUserUsername of the MySQL replication user
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.replication.roleRole of the MySQL server instance. Can be either: master, slave or none
Type:
"unspecified"
Default:
"none"
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.replication.serverIdId of the MySQL server instance. This number must be unique for each instance
Type:
"unspecified"
Default:
1
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.rootPasswordPath to a file containing the root password, modified on the first startup. Not specifying a root password will leave the root password empty.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysql.userUser account under which MySQL runs
Type:
"unspecified"
Default:
"mysql"
Declared by:
<nixpkgs/nixos/modules/services/databases/mysql.nix>
|
services.mysqlBackup.databasesList of database names to dump.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/backup/mysql-backup.nix>
|
services.mysqlBackup.enableWhether to enable MySQL backups.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/mysql-backup.nix>
|
services.mysqlBackup.locationLocation to put the gzipped MySQL database dumps.
Type:
"unspecified"
Default:
"/var/backup/mysql"
Declared by:
<nixpkgs/nixos/modules/services/backup/mysql-backup.nix>
|
services.mysqlBackup.periodThis option defines (in the format used by cron) when the databases should be dumped. The default is to update at 01:15 (at night) every day.
Type:
"unspecified"
Default:
"15 01 * * *"
Declared by:
<nixpkgs/nixos/modules/services/backup/mysql-backup.nix>
|
services.mysqlBackup.singleTransactionWhether to create database dump in a single transaction
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/mysql-backup.nix>
|
services.mysqlBackup.userUser to be used to perform backup.
Type:
"unspecified"
Default:
"mysql"
Declared by:
<nixpkgs/nixos/modules/services/backup/mysql-backup.nix>
|
services.nagios.cgiConfigFileDerivation for the configuration file of Nagios CGI scripts that can be used in web servers for running the Nagios web interface.
Type:
"unspecified"
Default:
(build of nagios.cgi.conf)
Declared by:
<nixpkgs/nixos/modules/services/monitoring/nagios.nix>
|
services.nagios.enableWhether to use Nagios to monitor your system or network.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/nagios.nix>
|
services.nagios.enableWebInterface
Whether to enable the Nagios web interface. You should also
enable Apache (services.httpd.enable).
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/nagios.nix>
|
services.nagios.mainConfigFileDerivation for the main configuration file of Nagios.
Type:
"unspecified"
Default:
(build of nagios.cfg)
Declared by:
<nixpkgs/nixos/modules/services/monitoring/nagios.nix>
|
services.nagios.objectDefsA list of Nagios object configuration files that must define the hosts, host groups, services and contacts for the network that you want Nagios to monitor.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/nagios.nix>
|
services.nagios.plugins
Packages to be added to the Nagios PATH.
Typically used to add plugins, but can be anything.
Type:
"unspecified"
Default:
[
(build of nagios-plugins-2.0.3) (build of ssmtp-2.64)
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/nagios.nix>
|
services.nagios.urlPath
The URL path under which the Nagios web interface appears.
That is, you can access the Nagios web interface through
http://.
server/urlPath
Type:
"unspecified"
Default:
"/nagios"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/nagios.nix>
|
services.neo4j.certNeo4j https certificate.
Type:
"path"
Default:
"/var/lib/neo4j/conf/ssl/neo4j.cert"
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.dataDirNeo4j data directory.
Type:
"path"
Default:
"/var/lib/neo4j"
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.enableWhether to enable neo4j.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.enableHttpsEnable https for Neo4j.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.extraServerConfigExtra configuration for neo4j server.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.hostNeo4j listen address.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.httpsPortNeo4j port to listen for HTTPS traffic.
Type:
"integer"
Default:
7473
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.keyNeo4j https certificate key.
Type:
"path"
Default:
"/var/lib/neo4j/conf/ssl/neo4j.key"
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.loggingConfigNeo4j logging configuration.
Type:
"string"
Default:
'' handlers=java.util.logging.ConsoleHandler .level=INFO org.neo4j.server.level=INFO java.util.logging.ConsoleHandler.level=INFO java.util.logging.ConsoleHandler.formatter=org.neo4j.server.logging.SimpleConsoleFormatter java.util.logging.ConsoleHandler.filter=org.neo4j.server.logging.NeoLogFilter ''
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.neo4j.portNeo4j port to listen for HTTP traffic.
Type:
"integer"
Default:
7474
Declared by:
<nixpkgs/nixos/modules/services/databases/neo4j.nix>
|
services.networking.websockify.enableWhether to enable websockify to forward websocket connections to TCP connections.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/websockify.nix>
|
services.networking.websockify.portMapPorts to map by default.
Type:
"attribute set of integers"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/networking/websockify.nix>
|
services.networking.websockify.sslCertPath to the SSL certificate.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/services/networking/websockify.nix>
|
services.networking.websockify.sslKeyPath to the SSL key.
Type:
"path"
Default:
"config.services.networking.websockify.sslCert"
Declared by:
<nixpkgs/nixos/modules/services/networking/websockify.nix>
|
services.nfs.lockdPortUse fixed port for NFS lock manager kernel module (lockd/nlockmgr), useful if NFS server is behind firewall.
Type:
"unspecified"
Default:
null
Example:
4001
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/nfs.nix>
|
services.nfs.server.createMountPointsWhether to create the mount points in the exports file at startup time.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix>
|
services.nfs.server.enableWhether to enable the kernel's NFS server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix>
|
services.nfs.server.exportsContents of the /etc/exports file. See exports(5) for the format.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix>
|
services.nfs.server.hostNameHostname or address on which NFS requests will be accepted.
Default is all. See the -H option in
nfsd(8).
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix>
|
services.nfs.server.lockdPortFix the lockd port number. This can help setting firewall rules for NFS.
Type:
"unspecified"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix>
|
services.nfs.server.mountdPortUse fixed port for rpc.mountd, useful if server is behind firewall.
Type:
"unspecified"
Default:
null
Example:
4002
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix>
|
services.nfs.server.nprocNumber of NFS server threads. Defaults to the recommended value of 8.
Type:
"unspecified"
Default:
8
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix>
|
services.nfs.statdPortUse fixed port for rpc.statd, useful if NFS server is behind firewall.
Type:
"unspecified"
Default:
null
Example:
4000
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/nfs.nix>
|
services.nginx.appendConfigConfiguration lines appended to the generated Nginx
configuration file. Commonly used by different modules
providing http snippets. appendConfig
can be specified more than once and it's value will be
concatenated (contrary to config which
can be set only once).
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/web-servers/nginx/default.nix>
|
services.nginx.configVerbatim nginx.conf configuration.
Type:
"unspecified"
Default:
"events {}"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/nginx/default.nix>
|
services.nginx.enableEnable the nginx Web Server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/nginx/default.nix>
|
services.nginx.groupGroup account under which nginx runs.
Type:
"string"
Default:
"nginx"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/nginx/default.nix>
|
services.nginx.httpConfigConfiguration lines to be appended inside of the http {} block.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/web-servers/nginx/default.nix>
|
services.nginx.stateDirDirectory holding all state for nginx to run.
Type:
"unspecified"
Default:
"/var/spool/nginx"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/nginx/default.nix>
|
services.nginx.userUser account under which nginx runs.
Type:
"string"
Default:
"nginx"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/nginx/default.nix>
|
services.ngircd.configThe ngircd configuration (see ngircd.conf(5)).
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/ngircd.nix>
|
services.ngircd.enableWhether to enable the ngircd IRC server.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ngircd.nix>
|
services.nixosManual.browserBrowser used to show the manual.
Type:
"path"
Default:
"/nix/store/h8pfaq57zpfl3k4k2y4p8a3n1356rif7-w3m-0.5.3/bin/w3m"
Declared by:
<nixpkgs/nixos/modules/services/misc/nixos-manual.nix>
|
services.nixosManual.enableWhether to build the NixOS manual pages.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/nixos-manual.nix>
|
services.nixosManual.showManualWhether to show the NixOS manual on one of the virtual consoles.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/nixos-manual.nix>
|
services.nixosManual.ttyNumberVirtual console on which to show the manual.
Type:
"unspecified"
Default:
"8"
Declared by:
<nixpkgs/nixos/modules/services/misc/nixos-manual.nix>
|
services.notbit.allowPrivateAddressesIf true, notbit will allow connections to to RFC 1918 addresses.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/notbit.nix>
|
services.notbit.enableEnables the notbit daemon and provides a sendmail binary named `notbit-system-sendmail` for sending mail over the system instance of notbit. Users must be in the notbit group in order to send mail over the system notbit instance. Currently mail recipt is not supported.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/notbit.nix>
|
services.notbit.listenAddressThe addresses which notbit will use to listen for incoming connections. These addresses are advertised to connecting clients.
Type:
"list of strings"
Default:
[
]
Example:
[
"localhost" "myhostname"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/notbit.nix>
|
services.notbit.niceSet the nice level for the notbit daemon
Type:
"integer"
Default:
10
Declared by:
<nixpkgs/nixos/modules/services/networking/notbit.nix>
|
services.notbit.noBootstrapIf true, notbit will not bootstrap an initial peerlist from bitmessage.org servers
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/notbit.nix>
|
services.notbit.peersThe initial set of peers notbit will connect to.
Type:
"list of strings"
Default:
[
]
Example:
[
"bitmessage.org:8877"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/notbit.nix>
|
services.notbit.portThe port which the daemon listens for other bitmessage clients
Type:
"integer"
Default:
8444
Declared by:
<nixpkgs/nixos/modules/services/networking/notbit.nix>
|
services.notbit.specifiedPeersOnlyIf true, notbit will only connect to peers specified by the peers option.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/notbit.nix>
|
services.nscd.configConfiguration to use for Name Service Cache Daemon.
Type:
"string"
Default:
'' server-user nscd threads 1 paranoia no debug-level 0 enable-cache passwd yes positive-time-to-live passwd 600 negative-time-to-live passwd 20 suggested-size passwd 211 check-files passwd yes persistent passwd no shared passwd yes enable-cache group yes positive-time-to-live group 3600 negative-time-to-live group 60 suggested-size group 211 check-files group yes persistent group no shared group yes enable-cache hosts yes positive-time-to-live hosts 600 negative-time-to-live hosts 5 suggested-size hosts 211 check-files hosts yes persistent hosts no shared hosts yes ''
Declared by:
<nixpkgs/nixos/modules/services/system/nscd.nix>
|
services.nscd.enableWhether to enable the Name Service Cache Daemon.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/system/nscd.nix>
|
services.nsd.bind8StatsWheter to enable BIND8 like statisics.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.enableWhether to enable the NSD authoritative domain name server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.extraConfigExtra nsd config.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.hideVersionWheter NSD should answer VERSION.BIND and VERSION.SERVER CHAOS class queries.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.identityIdentify the server (CH TXT ID.SERVER entry).
Type:
"string"
Default:
"unidentified server"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.interfacesWhat addresses the server should listen to.
Type:
"list of strings"
Default:
[
"127.0.0.0" "::1"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ipTransparentAllow binding to non local addresses.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ipv4Wheter to listen on IPv4 connections.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ipv4EDNSSizePreferred EDNS buffer size for IPv4.
Type:
"integer"
Default:
4096
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ipv6Wheter to listen on IPv6 connections.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ipv6EDNSSizePreferred EDNS buffer size for IPv6.
Type:
"integer"
Default:
4096
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.keysDefine your TSIG keys here.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
tsig.example.org =
{
algorithm = "hmac-md5"; secret = "aaaaaabbbbbbccccccdddddd";
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.keys.<name>.algorithmAuthentication algorithm for this key.
Type:
"string"
Default:
"hmac-sha256"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.keys.<name>.keyFilePath to the file which contains the actual base64 encoded key. The key will be copied into "/var/lib/nsd/private" before NSD starts. The copied file is only accessibly by the NSD user.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.nsidNSID identity (hex string, or "ascii_somestring").
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.portPort the service should bind do.
Type:
"integer"
Default:
53
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ratelimit.enableEnable ratelimit capabilities.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ratelimit.ipv4PrefixLengthIPv4 prefix length. Addresses are grouped by netblock.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ratelimit.ipv6PrefixLengthIPv6 prefix length. Addresses are grouped by netblock.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ratelimit.ratelimitMax qps allowed from any query source. 0 means unlimited. With an verbosity of 2 blocked and unblocked subnets will be logged.
Type:
"integer"
Default:
200
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ratelimit.sizeSize of the hashtable. More buckets use more memory but lower the chance of hash hash collisions.
Type:
"integer"
Default:
1000000
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ratelimit.slipNumber of packets that get discarded before replying a SLIP response. 0 disables SLIP responses. 1 will make every response a SLIP response.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.ratelimit.whitelistRatelimitMax qps allowed from whitelisted sources. 0 means unlimited. Set the rrl-whitelist option for specific queries to apply this limit instead of the default to them.
Type:
"integer"
Default:
2000
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.remoteControl.controlCertFilePath to the client certificate signed with the server certificate. This file is used by nsd-control and generated by nsd-control-setup.
Type:
"path"
Default:
"/etc/nsd/nsd_control.pem"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.remoteControl.controlKeyFilePath to the client private key, which is used by nsd-control but not by the server. This file is generated by nsd-control-setup.
Type:
"path"
Default:
"/etc/nsd/nsd_control.key"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.remoteControl.enableWheter to enable remote control via nsd-control(8).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.remoteControl.interfacesWhich interfaces NSD should bind to for remote control.
Type:
"list of strings"
Default:
[
"127.0.0.1" "::1"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.remoteControl.portPort number for remote control operations (uses TLS over TCP).
Type:
"integer"
Default:
8952
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.remoteControl.serverCertFilePath to the server self signed certificate, which is used by the server but and by nsd-control. This file is generated by nsd-control-setup.
Type:
"path"
Default:
"/etc/nsd/nsd_server.pem"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.remoteControl.serverKeyFilePath to the server private key, which is used by the server but not by nsd-control. This file is generated by nsd-control-setup.
Type:
"path"
Default:
"/etc/nsd/nsd_server.key"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.rootServerWheter if this server will be a root server (a DNS root server, you usually don't want that).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.serverCountNumber of NSD servers to fork. Put the number of CPUs to use here.
Type:
"integer"
Default:
1
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.statisticsStatistics are produced every number of seconds. Prints to log. If null no statistics are logged.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.tcpCountMaximum number of concurrent TCP connections per server.
Type:
"integer"
Default:
100
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.tcpQueryCountMaximum number of queries served on a single TCP connection. 0 means no maximum.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.tcpTimeoutTCP timeout in seconds.
Type:
"integer"
Default:
120
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.verbosityVerbosity level.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.xfrdReloadTimeoutNumber of seconds between reloads triggered by xfrd.
Type:
"integer"
Default:
1
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zonefilesCheckWheter to check mtime of all zone files on start and sighup.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zonesDefine your zones here. Zones can cascade other zones and therefore inherit settings from parent zones. Look at the definition of children to learn about inheritance and child zones. The given example will define 3 zones (example.(com|org|net).). Both example.com. and example.org. inherit their configuration from serverGroup1.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
example.net. =
{
data = "..."; provideXFR =
[
"10.3.2.1 NOKEY"
]
;
}
; serverGroup1 =
{
children =
{
example.com. =
{
data = "\$ORIGIN example.com.\n\$TTL 86400\n@ IN SOA a.ns.example.com. admin.example.com. (\n...\n";
}
; example.org. =
{
data = "\$ORIGIN example.org.\n\$TTL 86400\n@ IN SOA a.ns.example.com. admin.example.com. (\n...\n";
}
;
}
; provideXFR =
[
"10.1.2.3 NOKEY"
]
;
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.allowAXFRFallbackIf NSD as secondary server should be allowed to AXFR if the primary server does not allow IXFR.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.allowNotifyListed primary servers are allowed to notify this secondary server.
Format: <ip> <key-name | NOKEY | BLOCKED> <ip> either a plain IPv4/IPv6 address or range. Valid patters for ranges: * 10.0.0.0/24 # via subnet size * 10.0.0.0&255.255.255.0 # via subnet mask * 10.0.0.1-10.0.0.254 # via range A optional port number could be added with a '@': * 2001:1234::1@1234 <key-name | NOKEY | BLOCKED> * <key-name> will use the specified TSIG key * NOKEY no TSIG signature is required * BLOCKED notifies from non-listed or blocked IPs will be ignored *
Type:
"list of strings"
Default:
[
]
Example:
[
"192.0.2.0/24 NOKEY" "10.0.0.1-10.0.0.5 my_tsig_key_name" "10.0.3.4&255.255.0.0 BLOCKED"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.childrenChildren zones inherit all options of their parents. Attributes defined in a child will overwrite the ones of its parent. Only leaf zones will be actually served. This way it's possible to define maybe zones which share most attributes without duplicating everything. This mechanism replaces nsd's patterns in a save and functional way.
Type:
"unspecified"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.dataThe actual zone data. This is the content of your zone file. Use imports or pkgs.lib.readFile if you don't want this data in your config file.
Type:
"string"
Default:
""
Example:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.notifyThis primary server will notify all given secondary servers about zone changes.
Format: <ip> <key-name | NOKEY> <ip> a plain IPv4/IPv6 address with on optional port number (ip@port) <key-name | NOKEY> * <key-name> sign notifies with the specified key * NOKEY don't sign notifies
Type:
"list of strings"
Default:
[
]
Example:
[
"10.0.0.1@3721 my_key" "::5 NOKEY"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.notifyRetrySpecifies the number of retries for failed notifies. Set this along with notify.
Type:
"integer"
Default:
5
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.outgoingInterfaceThis address will be used for zone-transfere requests if configured as a secondary server or notifications in case of a primary server. Supply either a plain IPv4 or IPv6 address with an optional port number (ip@port).
Type:
"null or string"
Default:
null
Example:
"2000::1@1234"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.provideXFRAllow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED address range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40
Type:
"list of strings"
Default:
[
]
Example:
[
"192.0.2.0/24 NOKEY" "192.0.2.0/24 my_tsig_key_name"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.requestXFRFormat: [AXFR|UDP] <ip-address> <key-name | NOKEY>
Type:
"list of strings"
Default:
[
]
Example:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.rrlWhitelistWhitelists the given rrl-types. The RRL classification types are: nxdomain, error, referral, any, rrsig, wildcard, nodata, dnskey, positive, all
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.nsd.zones.<name>.zoneStatsWhen set to something distinct to null NSD is able to collect statistics per zone. All statistics of this zone(s) will be added to the group specified by this given name. Use "%s" to use the zones name as the group. The groups are output from nsd-control stats and stats_noreset.
Type:
"null or string"
Default:
null
Example:
"%s"
Declared by:
<nixpkgs/nixos/modules/services/networking/nsd.nix>
|
services.ntopng.configTextOverridable configuration file contents to use for ntopng. By default, use the contents automatically generated by NixOS.
Type:
"string"
Default:
""
Example:
'' --interface=any --http-port=3000 --disable-login ''
Declared by:
<nixpkgs/nixos/modules/services/networking/ntopng.nix>
|
services.ntopng.enableEnable ntopng, a high-speed web-based traffic analysis and flow collection tool. With the default configuration, ntopng monitors all network interfaces and displays its findings at http://localhost:3000. Default username and password is admin/admin. See the ntopng(8) manual page and http://www.ntop.org/products/ntop/ for more info. Note that enabling ntopng will also enable redis (key-value database server) for persistent data storage.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ntopng.nix>
|
services.ntopng.extraConfigConfiguration lines that will be appended to the generated ntopng
configuration file. Note that this mechanism does not work when the
manual configText option is used.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/ntopng.nix>
|
services.ntopng.http-portSets the HTTP port of the embedded web server.
Type:
"integer"
Default:
3000
Declared by:
<nixpkgs/nixos/modules/services/networking/ntopng.nix>
|
services.ntopng.interfacesList of interfaces to monitor. Use "any" to monitor all interfaces.
Type:
"list of strings"
Default:
[
"any"
]
Example:
[
"eth0" "wlan0"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ntopng.nix>
|
services.ntp.enableWhether to synchronise your machine's time using the NTP protocol.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ntpd.nix>
|
services.ntp.serversThe set of NTP servers from which to synchronise.
Type:
"unspecified"
Default:
[
"0.nixos.pool.ntp.org" "1.nixos.pool.ntp.org" "2.nixos.pool.ntp.org" "3.nixos.pool.ntp.org"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ntpd.nix>
|
services.nylon.acceptInterfaceTell nylon which interface to listen for client requests on, default is "lo".
Type:
"string"
Default:
"lo"
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.nylon.allowedIPRangesAllowed client IP ranges are evaluated first, defaults to ARIN IPv4 private ranges: [ "192.168.0.0/16" "127.0.0.0/8" "172.16.0.0/12" "10.0.0.0/8" ]
Type:
"list of strings"
Default:
[
"192.168.0.0/16" "127.0.0.1/8" "172.16.0.1/12" "10.0.0.0/8"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.nylon.bindInterfaceTell nylon which interface to use as an uplink, default is "enp3s0f0".
Type:
"string"
Default:
"enp3s0f0"
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.nylon.deniedIPRangesDenied client IP ranges, these gets evaluated after the allowed IP ranges, defaults to all IPv4 addresses: [ "0.0.0.0/0" ] To block all other access than the allowed.
Type:
"list of strings"
Default:
[
"0.0.0.0/0"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.nylon.enableEnables nylon as a running service upon activation.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.nylon.loggingEnable logging, default is no logging.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.nylon.nrConnectionsThe number of allowed simultaneous connections to the daemon, default 10.
Type:
"integer"
Default:
10
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.nylon.portWhat port to listen for client requests, default is 1080.
Type:
"integer"
Default:
1080
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.nylon.verbosityEnable verbose output, default is to not be verbose.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/nylon.nix>
|
services.oidentd.enableWhether to enable ‘oidentd’, an implementation of the Ident protocol (RFC 1413). It allows remote systems to identify the name of the user associated with a TCP connection.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/oidentd.nix>
|
services.openafsClient.cacheDirectoryCache directory.
Type:
"unspecified"
Default:
"/var/cache/openafs"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/openafs-client/default.nix>
|
services.openafsClient.cacheSizeCache size.
Type:
"unspecified"
Default:
"100000"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/openafs-client/default.nix>
|
services.openafsClient.cellNameCell name.
Type:
"unspecified"
Default:
"grand.central.org"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/openafs-client/default.nix>
|
services.openafsClient.cryptWhether to enable (weak) protocol encryption.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/openafs-client/default.nix>
|
services.openafsClient.enableWhether to enable the OpenAFS client.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/openafs-client/default.nix>
|
services.openafsClient.sparseMinimal cell list in /afs.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/openafs-client/default.nix>
|
services.openfire.enableWhether to enable OpenFire XMPP server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/openfire.nix>
|
services.openfire.usePostgreSQLWhether you use PostgreSQL service for your storage back-end.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/openfire.nix>
|
services.openldap.dataDirThe database directory.
Type:
"string"
Default:
"/var/db/openldap"
Declared by:
<nixpkgs/nixos/modules/services/databases/openldap.nix>
|
services.openldap.enableWhether to enable the ldap server.
Type:
"boolean"
Default:
false
Example:
openldap.enable = true;
openldap.extraConfig = ''
include ${pkgs.openldap}/etc/openldap/schema/core.schema
include ${pkgs.openldap}/etc/openldap/schema/cosine.schema
include ${pkgs.openldap}/etc/openldap/schema/inetorgperson.schema
include ${pkgs.openldap}/etc/openldap/schema/nis.schema
database bdb
suffix dc=example,dc=org
rootdn cn=admin,dc=example,dc=org
# NOTE: change after first start
rootpw secret
directory /var/db/openldap
'';
Declared by:
<nixpkgs/nixos/modules/services/databases/openldap.nix>
|
services.openldap.extraConfigsldapd.conf configuration
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/openldap.nix>
|
services.openldap.groupGroup account under which slapd runs.
Type:
"string"
Default:
"openldap"
Declared by:
<nixpkgs/nixos/modules/services/databases/openldap.nix>
|
services.openldap.userUser account under which slapd runs.
Type:
"string"
Default:
"openldap"
Declared by:
<nixpkgs/nixos/modules/services/databases/openldap.nix>
|
services.openntpd.enableWhether to enable OpenNTP time synchronization server.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/openntpd.nix>
|
services.openntpd.extraConfigAdditional text appended to openntpd.conf.
Type:
"string"
Default:
""
Example:
'' listen on 127.0.0.1 listen on ::1 ''
Declared by:
<nixpkgs/nixos/modules/services/networking/openntpd.nix>
|
services.openntpd.extraOptionsExtra options used when launching openntpd.
Type:
"string"
Default:
""
Example:
"-s"
Declared by:
<nixpkgs/nixos/modules/services/networking/openntpd.nix>
|
services.openntpd.serversThe set of NTP servers from which to synchronise.
Type:
"list of strings"
Default:
[
"0.nixos.pool.ntp.org" "1.nixos.pool.ntp.org" "2.nixos.pool.ntp.org" "3.nixos.pool.ntp.org"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/openntpd.nix>
|
services.opensmtpd.enableWhether to enable the OpenSMTPD server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/opensmtpd.nix>
|
services.opensmtpd.extraServerArgsExtra command line arguments provided when the smtpd process is started.
Type:
"list of strings"
Default:
[
]
Example:
[
"-v" "-P mta"
]
Declared by:
<nixpkgs/nixos/modules/services/mail/opensmtpd.nix>
|
services.opensmtpd.serverConfigurationThe contents of the smtpd.conf configuration file. See the OpenSMTPD documentation for syntax information. If this option is left empty, the OpenSMTPD server will not start.
Type:
"string"
Default:
""
Example:
'' listen on lo accept for any deliver to lmtp localhost:24 ''
Declared by:
<nixpkgs/nixos/modules/services/mail/opensmtpd.nix>
|
services.openssh.allowSFTPWhether to enable the SFTP subsystem in the SSH daemon. This enables the use of commands such as sftp and sshfs.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.authorizedKeysFilesFiles from with authorized keys are read.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.challengeResponseAuthenticationSpecifies whether challenge/response authentication is allowed.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.enableWhether to enable the OpenSSH secure shell daemon, which allows secure remote logins.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.extraConfigVerbatim contents of sshd_config.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.forwardX11Whether to allow X11 connections to be forwarded.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.gatewayPortsSpecifies whether remote hosts are allowed to connect to ports forwarded for the client. See sshd_config(5).
Type:
"string"
Default:
"no"
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.hostKeysNixOS can automatically generate SSH host keys. This option specifies the path, type and size of each key. See ssh-keygen(1) for supported types and sizes.
Type:
"list of attribute sets"
Default:
[
{
path = "/etc/ssh/ssh_host_dsa_key"; type = "dsa";
}
{
bits = 521; path = "/etc/ssh/ssh_host_ecdsa_key"; type = "ecdsa";
}
{
path = "/etc/ssh/ssh_host_ed25519_key"; type = "ed25519";
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.knownHostsThe set of system-wide known SSH hosts.
Type:
"list or attribute set of submodules"
Default:
{
}
Example:
[
{
hostNames =
[
"myhost" "myhost.mydomain.com" "10.10.1.4"
]
; publicKeyFile = ./pubkeys/myhost_ssh_host_dsa_key.pub;
}
{
hostNames =
[
"myhost2"
]
; publicKeyFile = ./pubkeys/myhost2_ssh_host_dsa_key.pub;
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.knownHosts.<name?>.hostNamesA list of host names and/or IP numbers used for accessing the host's ssh service.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.knownHosts.<name?>.publicKeyThe public key data for the host. You can fetch a public key from a running SSH server with the ssh-keyscan command. The public key should not include any host names, only the key type and the key itself. It is allowed to add several lines here, each line will be treated as type/key pair and the host names will be prepended to each line.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.knownHosts.<name?>.publicKeyFileThe path to the public key file for the host. The public
key file is read at build time and saved in the Nix store.
You can fetch a public key file from a running SSH server
with the ssh-keyscan command. The content
of the file should follow the same format as described for
the publicKey option.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.listenAddressesList of addresses and ports to listen on (ListenAddress directive
in config). If port is not specified for address sshd will listen
on all ports specified by ports option.
NOTE: this will override default listening on all local addresses and port 22.
NOTE: setting this option won't automatically enable given ports
in firewall configuration.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
addr = "192.168.3.1"; port = 22;
}
{
addr = "0.0.0.0"; port = 64022;
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.listenAddresses.*.addrHost, IPv4 or IPv6 address to listen to.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.listenAddresses.*.portPort to listen to.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.passwordAuthenticationSpecifies whether password authentication is allowed.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.permitRootLoginWhether the root user can login using ssh.
Type:
"one of yes, without-password, forced-commands-only, no"
Default:
"without-password"
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.portsSpecifies on which ports the SSH daemon listens.
Type:
"list of integers"
Default:
[
22
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.openssh.startWhenNeededIf set, sshd is socket-activated; that is, instead of having it permanently running as a daemon, systemd will start an instance for each incoming connection.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
services.opentsdb.enableWhether to run OpenTSDB.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/opentsdb.nix>
|
services.opentsdb.groupGroup account under which OpenTSDB runs.
Type:
"string"
Default:
"opentsdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/opentsdb.nix>
|
services.opentsdb.portWhich port OpenTSDB listens on.
Type:
"integer"
Default:
4242
Declared by:
<nixpkgs/nixos/modules/services/databases/opentsdb.nix>
|
services.opentsdb.userUser account under which OpenTSDB runs.
Type:
"string"
Default:
"opentsdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/opentsdb.nix>
|
services.openvpn.enableWhether to enable OpenVPN.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/openvpn.nix>
|
services.openvpn.serversEach attribute of this option defines a systemd service that
runs an OpenVPN instance. These can be OpenVPN servers or
clients. The name of each systemd service is
openvpn-,
where name.servicename is the corresponding
attribute name.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
server = {
config = ''
# Simplest server configuration: http://openvpn.net/index.php/documentation/miscellaneous/static-key-mini-howto.html.
# server :
dev tun
ifconfig 10.8.0.1 10.8.0.2
secret /root/static.key
'';
up = "ip route add ...";
down = "ip route del ...";
};
client = {
config = ''
client
remote vpn.example.org
dev tun
proto tcp-client
port 8080
ca /root/.vpn/ca.crt
cert /root/.vpn/alice.crt
key /root/.vpn/alice.key
'';
up = "echo nameserver $nameserver | ${pkgs.openresolv}/sbin/resolvconf -m 0 -a $dev";
down = "${pkgs.openresolv}/sbin/resolvconf -d $dev";
};
}
Declared by:
<nixpkgs/nixos/modules/services/networking/openvpn.nix>
|
services.openvpn.servers.<name>.autoStartWhether this OpenVPN instance should be started automatically.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/openvpn.nix>
|
services.openvpn.servers.<name>.configConfiguration of this OpenVPN instance. See openvpn(8) for details.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/openvpn.nix>
|
services.openvpn.servers.<name>.downShell commands executed when the instance is shutting down.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/openvpn.nix>
|
services.openvpn.servers.<name>.upShell commands executed when the instance is starting.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/openvpn.nix>
|
services.panamax.APIPortPanamax UI listening port.
Type:
"integer"
Default:
3000
Declared by:
<nixpkgs/nixos/modules/services/cluster/panamax.nix>
|
services.panamax.UIPortPanamax UI listening port.
Type:
"integer"
Default:
8888
Declared by:
<nixpkgs/nixos/modules/services/cluster/panamax.nix>
|
services.panamax.dataDirData dir for Panamax.
Type:
"string"
Default:
"/var/lib/panamax"
Declared by:
<nixpkgs/nixos/modules/services/cluster/panamax.nix>
|
services.panamax.enableWhether to enable Panamax service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/cluster/panamax.nix>
|
services.panamax.fleetctlEndpointPanamax fleetctl endpoint.
Type:
"string"
Default:
"http://127.0.0.1:4001"
Declared by:
<nixpkgs/nixos/modules/services/cluster/panamax.nix>
|
services.panamax.journalEndpointPanamax journal endpoint.
Type:
"string"
Default:
"http://127.0.0.1:19531"
Declared by:
<nixpkgs/nixos/modules/services/cluster/panamax.nix>
|
services.panamax.secretKeyPanamax secret key (do change this).
Type:
"string"
Default:
"SomethingVeryLong."
Declared by:
<nixpkgs/nixos/modules/services/cluster/panamax.nix>
|
services.parsoid.enableWhether to enable Parsoid -- bidirectional wikitext parser.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/parsoid.nix>
|
services.parsoid.extraConfigExtra configuration to add to parsoid configuration.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/parsoid.nix>
|
services.parsoid.interfaceInterface to listen on.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/misc/parsoid.nix>
|
services.parsoid.interwikisUsed MediaWiki API endpoints.
Type:
"attribute set of strings"
Example:
{
localhost = "http://localhost/api.php";
}
Declared by:
<nixpkgs/nixos/modules/services/misc/parsoid.nix>
|
services.parsoid.portPort to listen on.
Type:
"integer"
Default:
8000
Declared by:
<nixpkgs/nixos/modules/services/misc/parsoid.nix>
|
services.parsoid.workersNumber of Parsoid workers.
Type:
"integer"
Default:
2
Declared by:
<nixpkgs/nixos/modules/services/misc/parsoid.nix>
|
services.pcscd.enableWhether to enable the PCSC-Lite daemon.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/pcscd.nix>
|
services.peerflix.downloadDirPeerflix temporary download directory.
Type:
"path"
Default:
"/var/lib/peerflix/torrents"
Declared by:
<nixpkgs/nixos/modules/services/torrent/peerflix.nix>
|
services.peerflix.enableWhether to enable peerflix service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/torrent/peerflix.nix>
|
services.peerflix.stateDirPeerflix state directory.
Type:
"path"
Default:
"/var/lib/peerflix"
Declared by:
<nixpkgs/nixos/modules/services/torrent/peerflix.nix>
|
services.phd.enableEnable daemons for phabricator.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/phd.nix>
|
services.phpfpm.extraConfigExtra configuration that should be put in the global section of
the PHP FPM configuration file. Do not specify the options
pid, error_log or
daemonize here, since they are generated by
NixOS.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/web-servers/phpfpm.nix>
|
services.phpfpm.phpIniphp.ini file to use.
Type:
"path"
Default:
"/nix/store/sjknl3aba3rpb5iin9h8n42gijxcby9a-php-5.4.39/etc/php-recommended.ini"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/phpfpm.nix>
|
services.phpfpm.phpPackageThe PHP package to use for running the FPM service.
Type:
"unspecified"
Default:
(build of php-5.4.39)
Declared by:
<nixpkgs/nixos/modules/services/web-servers/phpfpm.nix>
|
services.phpfpm.poolConfigsA mapping between PHP FPM pool names and their configurations.
See the documentation on php-fpm.conf for
details on configuration directives. If no pools are defined,
the phpfpm service is disabled.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
mypool = "listen = /run/phpfpm/mypool\nuser = nobody\npm = dynamic\npm.max_children = 75\npm.start_servers = 10\npm.min_spare_servers = 5\npm.max_spare_servers = 20\npm.max_requests = 500\n";
}
Declared by:
<nixpkgs/nixos/modules/services/web-servers/phpfpm.nix>
|
services.polipo.allowedClientsList of IP addresses or network addresses that may connect to Polipo.
Type:
"list of strings"
Default:
[
"127.0.0.1" "::1"
]
Example:
[
"127.0.0.1" "::1" "134.157.168.0/24" "2001:660:116::/48"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/polipo.nix>
|
services.polipo.enableWhether to run the polipo caching web proxy.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/polipo.nix>
|
services.polipo.extraConfigPolio configuration. Contents will be added verbatim to the configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/polipo.nix>
|
services.polipo.parentProxyHostname and port number of an HTTP parent proxy; it should have the form ‘host:port’.
Type:
"string"
Default:
""
Example:
"localhost:8124"
Declared by:
<nixpkgs/nixos/modules/services/networking/polipo.nix>
|
services.polipo.proxyAddressIP address on which Polipo will listen.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/networking/polipo.nix>
|
services.polipo.proxyPortTCP port on which Polipo will listen.
Type:
"integer"
Default:
8123
Declared by:
<nixpkgs/nixos/modules/services/networking/polipo.nix>
|
services.polipo.socksParentProxyHostname and port number of an SOCKS parent proxy; it should have the form ‘host:port’.
Type:
"string"
Default:
""
Example:
"localhost:9050"
Declared by:
<nixpkgs/nixos/modules/services/networking/polipo.nix>
|
services.postfix.destinationFull (!) list of domains we deliver locally. Leave blank for acceptable Postfix default.
Type:
"unspecified"
Default:
null
Example:
[
"localhost"
]
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.domainDomain to use. Leave blank to use hostname minus first component.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.enableWhether to run the Postfix mail server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.extraAliasesAdditional entries to put verbatim into aliases file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.extraConfigExtra lines to be added verbatim to the main.cf configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.extraMasterConfExtra lines to append to the generated master.cf file.
Type:
"unspecified"
Default:
""
Example:
"submission inet n - n - - smtpd"
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.groupWhat to call the Postfix group (must be used only for postfix).
Type:
"unspecified"
Default:
"postfix"
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.hostnameHostname to use. Leave blank to use just the hostname of machine. It should be FQDN.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.lookupMXWhether relay specified is just domain whose MX must be used.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.networksNet masks for trusted - allowed to relay mail to third parties - hosts. Leave empty to use mynetworks_style configuration or use default (localhost-only).
Type:
"unspecified"
Default:
null
Example:
[
"192.168.0.1/24"
]
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.networksStyleName of standard way of trusted network specification to use, leave blank if you specify it explicitly or if you want to use default (localhost-only).
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.originOrigin to use in outgoing e-mail. Leave blank to use hostname.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.postmasterAliasWho should receive postmaster e-mail.
Type:
"unspecified"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.recipientDelimiterDelimiter for address extension: so mail to user+test can be handled by ~user/.forward+test
Type:
"unspecified"
Default:
""
Example:
"+"
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.relayDomainsList of domains we agree to relay to. Default is the same as destination.
Type:
"unspecified"
Default:
null
Example:
[
"localdomain"
]
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.relayHostMail relay for outbound mail.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.rootAliasWho should receive root e-mail. Blank for no redirection.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.setSendmailWhether to set the system sendmail to postfix's.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.setgidGroupHow to call postfix setgid group (for postdrop). Should be uniquely used group.
Type:
"unspecified"
Default:
"postdrop"
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.sslCACertSSL certificate of CA.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.sslCertSSL certificate to use.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.sslKeySSL key to use.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.userWhat to call the Postfix user (must be used only for postfix).
Type:
"unspecified"
Default:
"postfix"
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postfix.virtualEntries for the virtual alias map.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/mail/postfix.nix>
|
services.postgresql.authenticationDefines how users authenticate themselves to the server. By default, "trust" access to local users will always be granted along with any other custom options. If you do not want this, set this option using "lib.mkForce" to override this behaviour.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.dataDirData directory for PostgreSQL.
Type:
"path"
Default:
"/var/db/postgresql"
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.enableWhether to run PostgreSQL.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.enableTCPIPWhether PostgreSQL should listen on all network interfaces. If disabled, the database can only be accessed via its Unix domain socket or via TCP connections to localhost.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.extraConfigAdditional text to be appended to postgresql.conf.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.extraPluginsWhen this list contains elements a new store path is created. PostgreSQL and the elments are symlinked into it. Then pg_config, postgres and pc_ctl are copied to make them use the new $out/lib directory as pkglibdir. This makes it possible to use postgis without patching the .sql files which reference $libdir/postgis-1.5.
Type:
"list of paths"
Default:
[
]
Example:
pkgs.postgis
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.identMapDefines the mapping from system users to database users.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.initialScriptA file containing SQL statements to execute on first startup.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.portThe port on which PostgreSQL listens.
Type:
"integer"
Default:
5432
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresql.recoveryConfigContents of the recovery.conf file.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/databases/postgresql.nix>
|
services.postgresqlBackup.databasesList of database names to dump.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/backup/postgresql-backup.nix>
|
services.postgresqlBackup.enableWhether to enable PostgreSQL dumps.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/postgresql-backup.nix>
|
services.postgresqlBackup.locationLocation to put the gzipped PostgreSQL database dumps.
Type:
"unspecified"
Default:
"/var/backup/postgresql"
Declared by:
<nixpkgs/nixos/modules/services/backup/postgresql-backup.nix>
|
services.postgresqlBackup.periodThis option defines (in the format used by cron) when the databases should be dumped. The default is to update at 01:15 (at night) every day.
Type:
"unspecified"
Default:
"15 01 * * *"
Declared by:
<nixpkgs/nixos/modules/services/backup/postgresql-backup.nix>
|
services.prayer.enableWhether to run the prayer webmail http server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/prayer.nix>
|
services.prayer.extraConfigExtra configuration. Contents will be added verbatim to the configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/prayer.nix>
|
services.prayer.portPort the prayer http server is listening to.
Type:
"unspecified"
Default:
"2080"
Declared by:
<nixpkgs/nixos/modules/services/networking/prayer.nix>
|
services.prey.apiKeyAPI key obtained from https://panel.preyproject.com/profile
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/security/prey.nix>
|
services.prey.deviceKeyDevice Key obtained from https://panel.preyproject.com/devices (and clicking on the device)
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/security/prey.nix>
|
services.prey.enableEnables http://preyproject.com/ bash client. Be sure to specify api and device keys. Once setup, cronjob will run evert 15 minutes and report status.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/security/prey.nix>
|
services.printing.browsedConfThe contents of the configuration. file of the CUPS Browsed daemon
(cups-browsed.conf)
Type:
"string"
Default:
""
Example:
'' BrowsePoll cups.example.com ''
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.printing.clientConfThe contents of the client configuration.
(client.conf)
Type:
"string"
Default:
""
Example:
'' ServerName server.example.com Encryption Never ''
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.printing.cupsFilesConfThe contents of the configuration file of the CUPS daemon
(cups-files.conf).
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.printing.cupsdConfThe contents of the configuration file of the CUPS daemon
(cupsd.conf).
Type:
"string"
Default:
""
Example:
'' BrowsePoll cups.example.com LogLevel debug ''
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.printing.driversCUPS drivers to use. Drivers provided by CUPS, cups-filters, Ghostscript and Samba are added unconditionally.
Type:
"list of paths"
Example:
[ pkgs.splix ]
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.printing.enableWhether to enable printing support through the CUPS daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.printing.extraConfExtra contents of the configuration file of the CUPS daemon
(cupsd.conf).
Type:
"string"
Default:
""
Example:
'' BrowsePoll cups.example.com LogLevel debug ''
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.printing.listenAddressesA list of addresses and ports on which to listen.
Type:
"list of strings"
Default:
[
"127.0.0.1:631"
]
Example:
[
"*:631"
]
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.printing.tempDirCUPSd temporary directory.
Type:
"path"
Default:
"/tmp"
Example:
"/tmp/cups"
Declared by:
<nixpkgs/nixos/modules/services/printing/cupsd.nix>
|
services.privoxy.actionsFilesList of paths to Privoxy action files. These paths may either be absolute or relative to the privoxy configuration directory.
Type:
"list of strings"
Default:
[
"match-all.action" "default.action"
]
Example:
[
"match-all.action" "default.action" "/etc/privoxy/user.action"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/privoxy.nix>
|
services.privoxy.enableWhether to enable the Privoxy non-caching filtering proxy.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/privoxy.nix>
|
services.privoxy.enableEditActionsWhether or not the web-based actions file editor may be used.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/privoxy.nix>
|
services.privoxy.extraConfigExtra configuration. Contents will be added verbatim to the configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/privoxy.nix>
|
services.privoxy.filterFilesList of paths to Privoxy filter files. These paths may either be absolute or relative to the privoxy configuration directory.
Type:
"list of strings"
Default:
[
"default.filter"
]
Example:
[
"default.filter" "/etc/privoxy/user.filter"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/privoxy.nix>
|
services.privoxy.listenAddressAddress the proxy server is listening to.
Type:
"string"
Default:
"127.0.0.1:8118"
Declared by:
<nixpkgs/nixos/modules/services/networking/privoxy.nix>
|
services.prosody.adminsList of administrators of the current host
Type:
"unspecified"
Default:
[
]
Example:
[
"admin1@example.com" "admin2@example.com"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.allowRegistrationAllow account creation
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.enableWhether to enable the prosody server
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.extraConfigAdditional prosody configuration
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.extraModulesEnable custom modules
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.boshEnable BOSH clients, aka 'Jabber over HTTP'
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.consoletelnet to port 5582
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.dialbacks2s dialback support
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.discoService discovery
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.httpserverServe static files from a directory over HTTP
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.legacyauthLegacy authentication. Only used by some old clients and bots
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.pingReplies to XMPP pings with pongs
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.rosterAllow users to have a roster
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.saslauthAuthentication for clients and servers. Recommended if you want to log in.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.timeLet others know the time here on this server
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.tlsAdd support for secure TLS on c2s/s2s connections
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.uptimeReport how long server has been running
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.versionReplies to server version requests
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.modules.websocketEnable WebSocket support
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.sslPaths to SSL files
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.virtualHostsDefine the virtual hosts
Type:
"list or attribute set of submodules"
Default:
{
localhost =
{
domain = "localhost"; enabled = true;
}
;
}
Example:
{
myhost =
{
domain = "my-xmpp-example-host.org"; enabled = true;
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.virtualHosts.<name?>.domainDomain name
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.virtualHosts.<name?>.enabledWhether to enable the virtual host
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.virtualHosts.<name?>.extraConfigAdditional virtual host specific configuration
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.prosody.virtualHosts.<name?>.sslPaths to SSL files
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/prosody.nix>
|
services.psd.browsersA list of browsers to sync. Available choices are: chromium chromium-dev conkeror.mozdev.org epiphany firefox firefox-trunk google-chrome google-chrome-beta google-chrome-unstable heftig-aurora icecat luakit midori opera opera-developer opera-beta qupzilla palemoon rekonq seamonkey An empty list will enable all browsers.
Type:
"list of strings"
Default:
[
]
Example:
[
"chromium" "firefox"
]
Declared by:
<nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix>
|
services.psd.daemonFileWhere the pid and backup configuration files will be stored.
Type:
"string"
Default:
"/run/psd"
Declared by:
<nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix>
|
services.psd.enableWhether to enable the Profile Sync daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix>
|
services.psd.resyncTimerThe amount of time to wait before syncing browser profiles back to the disk. Takes a systemd.unit time span. The time unit defaults to seconds if omitted.
Type:
"string"
Default:
"1h"
Example:
"1h 30min"
Declared by:
<nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix>
|
services.psd.usersA list of users whose browser profiles should be sync'd to tmpfs.
Type:
"list of strings"
Default:
[
]
Example:
[
"demo"
]
Declared by:
<nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix>
|
services.psd.volatileThe directory where browser profiles should reside(this should be mounted as a tmpfs). Do not include a trailing backslash.
Type:
"string"
Default:
"/run/psd-profiles"
Declared by:
<nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix>
|
services.quassel.dataDirThe directory holding configuration files, the SQlite database and the SSL Cert.
Type:
"unspecified"
Default:
"/home/quassel/.config/quassel-irc.org"
Declared by:
<nixpkgs/nixos/modules/services/networking/quassel.nix>
|
services.quassel.enableWhether to run the Quassel IRC client daemon.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/quassel.nix>
|
services.quassel.interfaceThe interface the Quassel daemon will be listening to. If `127.0.0.1', only clients on the local host can connect to it; if `0.0.0.0', clients can access it from any network interface.
Type:
"unspecified"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/networking/quassel.nix>
|
services.quassel.portNumberThe port number the Quassel daemon will be listening to.
Type:
"unspecified"
Default:
4242
Declared by:
<nixpkgs/nixos/modules/services/networking/quassel.nix>
|
services.quassel.userThe existing user the Quassel daemon should run as. If left empty, a default "quassel" user will be created.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/quassel.nix>
|
services.rabbitmq.configVerbatim configuration file contents. See http://www.rabbitmq.com/configure.htm
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/amqp/rabbitmq.nix>
|
services.rabbitmq.cookieErlang cookie is a string of arbitrary length which must be the same for several nodes to be allowed to communicate. Leave empty to generate automatically.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/amqp/rabbitmq.nix>
|
services.rabbitmq.dataDirData directory for rabbitmq.
Type:
"path"
Default:
"/var/lib/rabbitmq"
Declared by:
<nixpkgs/nixos/modules/services/amqp/rabbitmq.nix>
|
services.rabbitmq.enableWhether to enable the RabbitMQ server, an Advanced Message Queuing Protocol (AMQP) broker.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/amqp/rabbitmq.nix>
|
services.rabbitmq.listenAddressIP address on which RabbitMQ will listen for AMQP
connections. Set to the empty string to listen on all
interfaces. Note that RabbitMQ creates a user named
guest with password
guest by default, so you should delete
this user if you intend to allow external access.
Type:
"string"
Default:
"127.0.0.1"
Example:
""
Declared by:
<nixpkgs/nixos/modules/services/amqp/rabbitmq.nix>
|
services.rabbitmq.pluginsThe names of plugins to enable
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/amqp/rabbitmq.nix>
|
services.rabbitmq.portPort on which RabbitMQ will listen for AMQP connections.
Type:
"integer"
Default:
5672
Declared by:
<nixpkgs/nixos/modules/services/amqp/rabbitmq.nix>
|
services.radicale.configRadicale configuration, this will set the service configuration file
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/radicale.nix>
|
services.radicale.enableEnable Radicale CalDAV and CardDAV server
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/radicale.nix>
|
services.radvd.configThe contents of the radvd configuration file.
Type:
"unspecified"
Example:
''
interface eth0 {
AdvSendAdvert on;
prefix 2001:db8:1234:5678::/64 { };
};
''Declared by:
<nixpkgs/nixos/modules/services/networking/radvd.nix>
|
services.radvd.enableWhether to enable the Router Advertisement Daemon (radvd), which provides link-local advertisements of IPv6 router addresses and prefixes using the Neighbor Discovery Protocol (NDP). This enables stateless address autoconfiguration in IPv6 clients on the network.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/radvd.nix>
|
services.rdnssd.enableWhether to enable the RDNSS daemon
(rdnssd), which configures DNS servers in
/etc/resolv.conf from RDNSS
advertisements sent by IPv6 routers.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/rdnssd.nix>
|
services.redis.appendFsyncHow often to fsync the append-only log, options: no, always, everysec.
Type:
"string"
Default:
"everysec"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.appendOnlyBy default data is only periodically persisted to disk, enable this option to use an append-only file for improved persistence.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.appendOnlyFilenameFilename for the append-only file (stored inside of dbpath)
Type:
"string"
Default:
"appendonly.aof"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.bindThe IP interface to bind to.
Type:
"null or string"
Default:
null
Example:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.databasesSet the number of databases.
Type:
"integer"
Default:
16
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.dbFilenameThe filename where to dump the DB.
Type:
"string"
Default:
"dump.rdb"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.dbpathThe DB will be written inside this directory, with the filename specified using the 'dbFilename' configuration.
Type:
"path"
Default:
"/var/lib/redis"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.enableWhether to enable the Redis server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.extraConfigExtra configuration options for redis.conf.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.logLevelSpecify the server verbosity level, options: debug, verbose, notice, warning.
Type:
"string"
Default:
"notice"
Example:
"debug"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.logfileSpecify the log file name. Also 'stdout' can be used to force Redis to log on the standard output.
Type:
"string"
Default:
"/dev/null"
Example:
"/var/log/redis.log"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.masterAuthIf the master is password protected (using the requirePass configuration) it is possible to tell the slave to authenticate before starting the replication synchronization process, otherwise the master will refuse the slave request. (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.pidFileType:
"path"
Default:
"/var/lib/redis/redis.pid"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.portThe port for Redis to listen to.
Type:
"integer"
Default:
6379
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.requirePassPassword for database (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
Type:
"null or string"
Default:
null
Example:
"letmein!"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.saveThe schedule in which data is persisted to disk, represented as a list of lists where the first element represent the amount of seconds and the second the number of changes.
Type:
"list of list of integerss"
Default:
[
[
900 1
]
[
300 10
]
[
60 10000
]
]
Example:
[
[
900 1
]
[
300 10
]
[
60 10000
]
]
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.slaveOfAn attribute set with two attributes: ip and port to which this redis instance acts as a slave.
Type:
"unspecified"
Default:
null
Example:
{
ip = "192.168.1.100"; port = 6379;
}
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.slowLogLogSlowerThanLog queries whose execution take longer than X in milliseconds.
Type:
"integer"
Default:
10000
Example:
1000
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.slowLogMaxLenMaximum number of items to keep in slow log.
Type:
"integer"
Default:
128
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.syslogEnable logging to the system logger.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.unixSocketThe path to the socket to bind to.
Type:
"null or path"
Default:
null
Example:
"/var/run/redis.sock"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redis.userUser account under which Redis runs.
Type:
"string"
Default:
"redis"
Declared by:
<nixpkgs/nixos/modules/services/databases/redis.nix>
|
services.redmine.databaseHostDatabase hostname
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redmine.databaseNameDatabase name
Type:
"string"
Default:
"redmine"
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redmine.databasePasswordDatabase user password
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redmine.databaseUsernameDatabase user
Type:
"string"
Default:
"redmine"
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redmine.enableEnable the redmine service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redmine.extraConfigExtra configuration in configuration.yml
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redmine.pluginsSet of plugins
Type:
"attribute set of paths"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redmine.stateDirThe state directory, logs and plugins are stored here
Type:
"string"
Default:
"/var/redmine"
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redmine.themesSet of themes
Type:
"attribute set of paths"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/misc/redmine.nix>
|
services.redshift.brightness.dayScreen brightness to apply during the day (between 0.1 and 1.0)
Type:
"string"
Default:
"1"
Declared by:
<nixpkgs/nixos/modules/services/x11/redshift.nix>
|
services.redshift.brightness.nightScreen brightness to apply during the night (between 0.1 and 1.0)
Type:
"string"
Default:
"1"
Declared by:
<nixpkgs/nixos/modules/services/x11/redshift.nix>
|
services.redshift.enableEnable Redshift to change your screen's colour temperature depending on the time of day
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/redshift.nix>
|
services.redshift.latitudeYour current latitude
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/x11/redshift.nix>
|
services.redshift.longitudeYour current longitude
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/x11/redshift.nix>
|
services.redshift.temperature.dayColour temperature to use during day time
Type:
"integer"
Default:
5500
Declared by:
<nixpkgs/nixos/modules/services/x11/redshift.nix>
|
services.redshift.temperature.nightColour temperature to use during night time
Type:
"integer"
Default:
3700
Declared by:
<nixpkgs/nixos/modules/services/x11/redshift.nix>
|
services.resolved.enableEnables the systemd dns resolver daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
services.riemann.configContents of the Riemann configuration file.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/riemann.nix>
|
services.riemann.configFilesExtra files containing Riemann configuration. These files will be
loaded at runtime by Riemann (with Clojure's
load-file function) at the end of the
configuration.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/riemann.nix>
|
services.riemann.enableEnable the Riemann network monitoring daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/riemann.nix>
|
services.riemann.extraClasspathEntriesExtra entries added to the Java classpath when running Riemann.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/riemann.nix>
|
services.riemann.extraJavaOptsExtra Java options used when launching Riemann.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/riemann.nix>
|
services.riemann-dash.configContents added to the end of the riemann-dash configuration file.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/riemann-dash.nix>
|
services.riemann-dash.dataDirLocation of the riemann-base dir. The dashboard configuration file is is stored to this directory. The directory is created automatically on service start, and owner is set to the riemanndash user.
Type:
"string"
Default:
"/var/riemann-dash"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/riemann-dash.nix>
|
services.riemann-dash.enableEnable the riemann-dash dashboard daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/riemann-dash.nix>
|
services.rippleDataApi.couchdb.createWhether to create couchdb database needed by ripple data api.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.couchdb.dbRipple data api couchdb database.
Type:
"string"
Default:
"rippled"
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.couchdb.hostRipple data api couchdb host.
Type:
"string"
Default:
"localhost"
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.couchdb.passRipple data api couchdb password.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.couchdb.portRipple data api couchdb port.
Type:
"integer"
Default:
5984
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.couchdb.userRipple data api couchdb username.
Type:
"string"
Default:
"rippled"
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.enableWhether to enable Whether to enable ripple data api..
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.portRipple data api port
Type:
"integer"
Default:
5993
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.redis.enableWhether to enable caching of ripple data to redis.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.redis.hostRipple data api redis host.
Type:
"string"
Default:
"localhost"
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.redis.portRipple data api redis port.
Type:
"integer"
Default:
5984
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippleDataApi.rippledsList of rippleds to be used by ripple data api.
Type:
"list of strings"
Default:
[
"http://s_east.ripple.com:51234" "http://s_west.ripple.com:51234"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/ripple-data-api.nix>
|
services.rippled.databasePathPath to the ripple database.
Type:
"path"
Default:
"/var/lib/rippled/db"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.enableWhether to enable Whether to enable rippled.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.extraConfigExtra lines to be added verbatim to the rippled.cfg configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.fetchDepthThe number of past ledgers to serve to other peers that request historical ledger data (or "full" for no limit).
Type:
"integer or one of full"
Default:
"full"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.importDbSettings for performing a one-time import.
Type:
"null or submodule"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.importDb.advisoryDeleteIf set, then require administrative RPC call "can_delete" to enable online deletion of ledger records.
Type:
"null or boolean"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.importDb.compressionWhether to enable snappy compression.
Type:
"null or boolean"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.importDb.extraOptsExtra database options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.importDb.onlineDeleteEnable automatic purging of older ledger information.
Type:
"null or integer"
Default:
1296000
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.importDb.pathLocation to store the database.
Type:
"path"
Default:
"/var/lib/rippled/db"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.importDb.typeRippled database type.
Type:
"one of rocksdb, nudb, sqlite"
Default:
"rocksdb"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ipsList of hostnames or ips where the Ripple protocol is served. For a starter list, you can either copy entries from: https://ripple.com/ripple.txt or if you prefer you can let it default to r.ripple.com 51235 A port may optionally be specified after adding a space to the address. By convention, if known, IPs are listed in from most to least trusted.
Type:
"list of strings"
Default:
[
"r.ripple.com 51235"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ipsFixedList of IP addresses or hostnames to which rippled should always attempt to maintain peer connections with. This is useful for manually forming private networks, for example to configure a validation server that connects to the Ripple network through a public-facing server, or for building a set of cluster peers. A port may optionally be specified after adding a space to the address
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ledgerHistoryThe number of past ledgers to acquire on server startup and the minimum to maintain while running.
Type:
"integer or one of full"
Default:
1296000
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.logLevelLogging verbosity.
Type:
"one of debug, error, info"
Default:
"error"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.nodeDbRippled main database options.
Type:
"null or submodule"
Default:
{
extraOpts = " open_files=2000\n filter_bits=12\n cache_mb=256\n file_size_pb=8\n file_size_mult=2;\n "; type = "rocksdb";
}
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.nodeDb.advisoryDeleteIf set, then require administrative RPC call "can_delete" to enable online deletion of ledger records.
Type:
"null or boolean"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.nodeDb.compressionWhether to enable snappy compression.
Type:
"null or boolean"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.nodeDb.extraOptsExtra database options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.nodeDb.onlineDeleteEnable automatic purging of older ledger information.
Type:
"null or integer"
Default:
1296000
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.nodeDb.pathLocation to store the database.
Type:
"path"
Default:
"/var/lib/rippled/db"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.nodeDb.typeRippled database type.
Type:
"one of rocksdb, nudb, sqlite"
Default:
"rocksdb"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.nodeSizeRippled size of the node you are running. "tiny", "small", "medium", "large", and "huge"
Type:
"one of tiny, small, medium, large, huge"
Default:
"small"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.portsPorts exposed by rippled
Type:
"attribute set of submodules"
Default:
{
peer =
{
ip = "0.0.0.0"; port = 51235; protocol =
[
"peer"
]
;
}
; rpc =
{
admin = true; port = 5005; protocol =
[
"http"
]
;
}
; ws_public =
{
ip = "0.0.0.0"; port = 5006; protocol =
[
"ws" "wss"
]
;
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.adminControls whether or not administrative commands are allowed.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.ipIp where rippled listens.
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.passwordWhen set, these credentials will be required on HTTP/S requests.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.portPort where rippled listens.
Type:
"integer"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.protocolProtocols expose by rippled.
Type:
"list of one of http, https, ws, wss, peers"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.ssl.certSpecifies the path to the SSL certificate file in PEM format. This is not needed if the chain includes it.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.ssl.chainIf you need a certificate chain, specify the path to the certificate chain here. The chain may include the end certificate.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.ssl.keySpecifies the filename holding the SSL key in PEM format.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.ports.<name>.userWhen set, these credentials will be required on HTTP/S requests.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.sntpServersIP address or domain of NTP servers to use for time synchronization.;
Type:
"list of strings"
Default:
[
"time.windows.com" "time.apple.com" "time.nist.gov" "pool.ntp.org"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.tempDbRippled temporary database options.
Type:
"null or submodule"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.tempDb.advisoryDeleteIf set, then require administrative RPC call "can_delete" to enable online deletion of ledger records.
Type:
"null or boolean"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.tempDb.compressionWhether to enable snappy compression.
Type:
"null or boolean"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.tempDb.extraOptsExtra database options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.tempDb.onlineDeleteEnable automatic purging of older ledger information.
Type:
"null or integer"
Default:
1296000
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.tempDb.pathLocation to store the database.
Type:
"path"
Default:
"/var/lib/rippled/db"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.tempDb.typeRippled database type.
Type:
"one of rocksdb, nudb, sqlite"
Default:
"rocksdb"
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.validationQuorumThe minimum number of trusted validations a ledger must have before the server considers it fully validated.
Type:
"integer"
Default:
3
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rippled.validatorsList of nodes to always accept as validators. Nodes are specified by domain or public key.
Type:
"list of strings"
Default:
[
"n949f75evCHwgyP4fPVgaHqNHxUVN15PsJEZ3B3HnXPcPjcZAoy7 RL1" "n9MD5h24qrQqiyBC8aeqqCWvpiBiYQ3jxSr91uiDvmrkyHRdYLUj RL2" "n9L81uNCaPgtUJfaHh89gmdvXKAmSt5Gdsw2g1iPWaPkAHW5Nm4C RL3" "n9KiYM9CgngLvtRCQHZwgC2gjpdaZcCcbt3VboxiNFcKuwFVujzS RL4" "n9LdgEtkmGB9E2h3K4Vp7iGUaKuq23Zr32ehxiU8FWY7xoxbWTSA RL5"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/rippled.nix>
|
services.rogue.enableWhether to enable the Rogue game on one of the virtual consoles.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/rogue.nix>
|
services.rogue.ttyVirtual console on which to run Rogue.
Type:
"string"
Default:
"tty9"
Declared by:
<nixpkgs/nixos/modules/services/misc/rogue.nix>
|
services.rpcbind.enableWhether to enable `rpcbind', an ONC RPC directory service notably used by NFS and NIS, and which can be queried using the rpcinfo(1) command. `rpcbind` is a replacement for `portmap`.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/rpcbind.nix>
|
services.rsnapshot.cronIntervalsPeriodicity at which intervals should be run by cron. Note that the intervals also have to exist in configuration as retain options.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
daily = "50 21 * * *"; hourly = "0 * * * *";
}
Declared by:
<nixpkgs/nixos/modules/services/backup/rsnapshot.nix>
|
services.rsnapshot.enableWhether to enable rsnapshot backups.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/backup/rsnapshot.nix>
|
services.rsnapshot.extraConfigrsnapshot configuration option in addition to the defaults from rsnapshot and this module. Note that tabs are required to separate option arguments, and directory names require trailing slashes. The "extra" in the option name might be a little misleading right now, as it is required to get a functional configuration.
Type:
"string"
Default:
""
Example:
'' retains hourly 24 retain daily 365 backup /home/ localhost/ ''
Declared by:
<nixpkgs/nixos/modules/services/backup/rsnapshot.nix>
|
services.rsyncd.addressIP address the daemon will listen on; rsyncd will listen on all addresses if this is not specified.
Type:
"unspecified"
Default:
""
Example:
"192.168.1.2"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix>
|
services.rsyncd.enableWhether to enable the rsync daemon.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix>
|
services.rsyncd.extraConfigLines of configuration to add to rsyncd globally. See man rsyncd.conf for options.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix>
|
services.rsyncd.modulesA set describing exported directories. See man rsyncd.conf for options.
Type:
"attribute set of attribute set of stringss"
Default:
{
}
Example:
{
srv =
{
comment = "Public rsync share."; path = "/srv"; read only = "yes";
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix>
|
services.rsyncd.motdMessage of the day to display to clients on each connect. This usually contains site information and any legal notices.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix>
|
services.rsyncd.portTCP port the daemon will listen on.
Type:
"integer"
Default:
873
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix>
|
services.rsyslogd.defaultConfigThe default syslog.conf file configures a
fairly standard setup of log files, which can be extended by
means of extraConfig.
Type:
"string"
Default:
'' # "local1" is used for dhcpd messages. local1.* -/var/log/dhcpd mail.* -/var/log/mail *.=warning;*.=err -/var/log/warn *.crit /var/log/warn *.*;mail.none;local1.none -/var/log/messages ''
Declared by:
<nixpkgs/nixos/modules/services/logging/rsyslogd.nix>
|
services.rsyslogd.enableWhether to enable syslogd. Note that systemd also logs syslog messages, so you normally don't need to run syslogd.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/rsyslogd.nix>
|
services.rsyslogd.extraConfigAdditional text appended to syslog.conf,
i.e. the contents of defaultConfig.
Type:
"string"
Default:
""
Example:
"news.* -/var/log/news"
Declared by:
<nixpkgs/nixos/modules/services/logging/rsyslogd.nix>
|
services.rsyslogd.extraParamsAdditional parameters passed to rsyslogd.
Type:
"list of strings"
Default:
[
]
Example:
[
"-m 0"
]
Declared by:
<nixpkgs/nixos/modules/services/logging/rsyslogd.nix>
|
services.sabnzbd.configFilePath to config file. (You need to create this file yourself!)
Type:
"unspecified"
Default:
"/var/sabnzbd/sabnzbd.ini"
Declared by:
<nixpkgs/nixos/modules/services/networking/sabnzbd.nix>
|
services.sabnzbd.enableWhether to enable the sabnzbd FTP server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/sabnzbd.nix>
|
services.samba.configTextVerbatim contents of smb.conf. If null (default), use the autogenerated file from NixOS instead.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/samba.nix>
|
services.samba.enableWhether to enable Samba, which provides file and print services to Windows clients through the SMB/CIFS protocol.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/samba.nix>
|
services.samba.extraConfigAdditional global section and extra section lines go in here.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/samba.nix>
|
services.samba.invalidUsersList of users who are denied to login via Samba.
Type:
"list of strings"
Default:
[
"root"
]
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/samba.nix>
|
services.samba.nsswinsWhether to enable the WINS NSS (Name Service Switch) plug-in. Enabling it allows applications to resolve WINS/NetBIOS names (a.k.a. Windows machine names) by transparently querying the winbindd daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/samba.nix>
|
services.samba.securityTypeSamba security type
Type:
"string"
Default:
"user"
Example:
"share"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/samba.nix>
|
services.samba.sharesA set describing shared resources. See man smb.conf for options.
Type:
"attribute set of attribute set of unspecifiedss"
Default:
{
}
Example:
{
srv =
{
comment = "Public samba share."; path = "/srv"; read only = "yes";
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/samba.nix>
|
services.samba.syncPasswordsByPamEnabling this will add a line directly after pam_unix.so. Whenever a password is changed the samba password will be updated as well. However you still yave to add the samba password once using smbpasswd -a user If you don't want to maintain an extra pwd database you still can send plain text passwords which is not secure.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/samba.nix>
|
services.scollector.bosunHostHost and port of the bosun server that will store the collected data.
Type:
"string"
Default:
"localhost:8070"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/scollector.nix>
|
services.scollector.collectorsAn attribute set mapping the frequency of collection to a list of binaries that should be executed at that frequency. You can use "0" to run a binary forever.
Type:
"attribute set"
Default:
{
}
Example:
{ 0 = [ "${postgresStats}/bin/collect-stats" ]; }Declared by:
<nixpkgs/nixos/modules/services/monitoring/scollector.nix>
|
services.scollector.enableWhether to run scollector.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/scollector.nix>
|
services.scollector.extraOptsExtra scollector command line options
Type:
"list of strings"
Default:
[
]
Example:
[
"-d"
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/scollector.nix>
|
services.scollector.groupGroup account under which scollector runs.
Type:
"string"
Default:
"scollector"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/scollector.nix>
|
services.scollector.userUser account under which scollector runs.
Type:
"string"
Default:
"scollector"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/scollector.nix>
|
services.searx.configFileThe path of the Searx server configuration file. If no file is specified, a default file is used (default config file has debug mode enabled).
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/searx.nix>
|
services.searx.enableWhether to enable the Searx server. See https://github.com/asciimoo/searx
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/searx.nix>
|
services.seeks.confDirThe Seeks server configuration. If it is not specified, a default configuration is used (/nix/store/ginb3s4q3v3zhc7l6wsm4bs9swfmlnyv-seeks-0.4.1/etc/seeks).
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/seeks.nix>
|
services.seeks.enableWhether to enable the Seeks server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/seeks.nix>
|
services.siproxd.enableWhether to enable the Siproxd SIP proxy/masquerading daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.extraConfigExtra configuration to add to siproxd configuration.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.hostsAllowRegAcess control list for incoming SIP registrations.
Type:
"list of strings"
Default:
[
]
Example:
[
"192.168.1.0/24" "192.168.2.0/24"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.hostsAllowSipAcess control list for incoming SIP traffic.
Type:
"list of strings"
Default:
[
]
Example:
[
"123.45.0.0/16" "123.46.0.0/16"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.hostsDenySipAcess control list for denying incoming SIP registrations and traffic.
Type:
"list of strings"
Default:
[
]
Example:
[
"10.0.0.0/8" "11.0.0.0/8"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.ifInboundLocal network interface
Type:
"string"
Example:
"eth0"
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.ifOutboundPublic network interface
Type:
"string"
Example:
"ppp0"
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.passwordFilePath to per-user password file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.rtpDscpDSCP (differentiated services) value to be assigned to RTP packets. Allows QOS aware routers to handle different types traffic with different priorities.
Type:
"integer"
Default:
46
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.rtpPortHighTop of UDP port range for incoming and outgoing RTP traffic
Type:
"integer"
Default:
7089
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.rtpPortLowBottom of UDP port range for incoming and outgoing RTP traffic
Type:
"integer"
Default:
7070
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.rtpTimeoutTimeout for an RTP stream. If for the specified number of seconds no data is relayed on an active stream, it is considered dead and will be killed.
Type:
"integer"
Default:
300
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.sipDscpDSCP (differentiated services) value to be assigned to SIP packets. Allows QOS aware routers to handle different types traffic with different priorities.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.siproxd.sipListenPortPort to listen for incoming SIP messages.
Type:
"integer"
Default:
5060
Declared by:
<nixpkgs/nixos/modules/services/misc/siproxd.nix>
|
services.sitecopy.backupsList of attributesets describing the backups.
Username/password are extracted from /var/spool/sitecopy/sitecopy.secrets at activation
time. The secrets file lines should have the following structure:
server username password
Type:
"unspecified"
Default:
[
]
Example:
[
{
https = true; local = "/tmp/backup"; name = "test"; protocol = "webdav"; remote = "/staff-groups/ewi/st/strategoxt/backup/test"; server = "webdata.tudelft.nl"; symlinks = "maintain";
}
]
Declared by:
<nixpkgs/nixos/modules/services/backup/sitecopy-backup.nix>
|
services.sitecopy.enableWhether to enable sitecopy backups of specified directories.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/sitecopy-backup.nix>
|
services.sitecopy.periodThis option defines (in the format used by cron) when the sitecopy backup are being run. The default is to update at 04:15 (at night) every day.
Type:
"unspecified"
Default:
"15 04 * * *"
Declared by:
<nixpkgs/nixos/modules/services/backup/sitecopy-backup.nix>
|
services.slurm.client.enableWhether to enable slurm rlient daemon.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/computing/slurm/slurm.nix>
|
services.slurm.controlAddrName that ControlMachine should be referred to in establishing a communications path.
Type:
"null or string"
Default:
null
Example:
null
Declared by:
<nixpkgs/nixos/modules/services/computing/slurm/slurm.nix>
|
services.slurm.controlMachineThe short hostname of the machine where SLURM control functions are executed (i.e. the name returned by the command "hostname -s", use "tux001" rather than "tux001.my.com").
Type:
"null or string"
Default:
null
Example:
null
Declared by:
<nixpkgs/nixos/modules/services/computing/slurm/slurm.nix>
|
services.slurm.extraConfigExtra configuration options that will be added verbatim at the end of the slurm configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/computing/slurm/slurm.nix>
|
services.slurm.nodeNameName that SLURM uses to refer to a node (or base partition for BlueGene systems). Typically this would be the string that "/bin/hostname -s" returns. Note that now you have to write node's parameters after the name.
Type:
"null or string"
Default:
null
Example:
"linux[1-32] CPUs=1 State=UNKNOWN"
Declared by:
<nixpkgs/nixos/modules/services/computing/slurm/slurm.nix>
|
services.slurm.partitionNameName by which the partition may be referenced. Note that now you have to write patrition's parameters after the name.
Type:
"null or string"
Default:
null
Example:
"debug Nodes=linux[1-32] Default=YES MaxTime=INFINITE State=UP"
Declared by:
<nixpkgs/nixos/modules/services/computing/slurm/slurm.nix>
|
services.slurm.server.enableWhether to enable slurm control daemon.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/computing/slurm/slurm.nix>
|
services.smartd.deviceOptsAdditional options for each device that is monitored. The example turns on SMART Automatic Offline Testing on startup, and schedules short self-tests daily, and long self-tests weekly.
Type:
"string"
Default:
""
Example:
"-o on -s (S/../.././02|L/../../7/04)"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/smartd.nix>
|
services.smartd.devicesList of devices to monitor. By default -- if this list is empty --, smartd will monitor all devices connected to the machine at the time it's being run. Configuring this option has the added benefit of enabling e-mail notifications to "root" every time smartd detects an error.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
device = "/dev/sda";
}
{
device = "/dev/sdb"; options = "-d sat";
}
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/smartd.nix>
|
services.smartd.devices.*.deviceLocation of the device.
Type:
"string"
Example:
"/dev/sda"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/smartd.nix>
|
services.smartd.devices.*.optionsOptions that determine how smartd monitors the device.
Type:
"string"
Default:
""
Example:
"-d sat"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/smartd.nix>
|
services.smartd.enableRun smartd from the smartmontools package. Note that e-mail
notifications will not be enabled unless you configure the list of
devices with services.smartd.devices as well.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/monitoring/smartd.nix>
|
services.solr.enableEnables the solr service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/search/solr.nix>
|
services.solr.extraJarsList of paths pointing to jars. Jars are copied to commonLibFolder to be available to java/solr.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/search/solr.nix>
|
services.solr.extraJavaOptionsExtra command line options given to the java process running solr.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/search/solr.nix>
|
services.solr.extraWinstoneOptionsExtra command line options given to the Winstone, which is the servlet container hosting solr.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/search/solr.nix>
|
services.solr.groupThe group that will own the working directory.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/search/solr.nix>
|
services.solr.log4jConfigurationContents of the log4j.properties used. By default,
everything is logged to stdout (picked up by systemd) with level INFO.
Type:
"string"
Default:
''
log4j.rootLogger=INFO, stdout
log4j.appender.stdout=org.apache.log4j.ConsoleAppender
log4j.appender.stdout.Target=System.out
log4j.appender.stdout.layout=org.apache.log4j.PatternLayout
log4j.appender.stdout.layout.ConversionPattern=%d{yyyy-MM-dd HH:mm:ss} %-5p %c{1}:%L - %m%n
''Declared by:
<nixpkgs/nixos/modules/services/search/solr.nix>
|
services.solr.solrHomeThe solr home directory. It is your own responsibility to make sure this directory contains a working solr configuration, and is writeable by the the user running the solr service. Failing to do so, the solr will not start properly.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/search/solr.nix>
|
services.solr.userThe user that should run the solr process and. the working directories.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/search/solr.nix>
|
services.spamassassin.debugWhether to run the SpamAssassin daemon in debug mode.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/spamassassin.nix>
|
services.spamassassin.enableWhether to run the SpamAssassin daemon.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/mail/spamassassin.nix>
|
services.spiped.configConfiguration for a secure pipe daemon. The daemon can be
started, stopped, or examined using
systemctl, under the name
spiped@foo.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
pipe1 =
{ keyfile = "/var/lib/spiped/pipe1.key";
encrypt = true;
source = "localhost:6000";
target = "endpoint.example.com:7000";
};
pipe2 =
{ keyfile = "/var/lib/spiped/pipe2.key";
decrypt = true;
source = "0.0.0.0:7000";
target = "localhost:3000";
};
}
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.decryptTake encrypted connections from the
source socket and send unencrypted
connections to the target socket.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.disableKeepalivesDisable transport layer keep-alives.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.disableReresolutionDisable target address re-resolution.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.encryptTake unencrypted connections from the
source socket and send encrypted
connections to the target socket.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.keyfileName of a file containing the spiped key. As the
daemon runs as the spiped user, the
key file must be somewhere owned by that user. By
default, we recommend putting the keys for any spipe
services in /var/lib/spiped.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.maxConnsLimit on the number of simultaneous connections allowed.
Type:
"integer"
Default:
100
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.resolveRefreshResolution refresh time for the target socket, in seconds.
Type:
"integer"
Default:
60
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.sourceAddress on which spiped should listen for incoming
connections. Must be in one of the following formats:
/absolute/path/to/unix/socket,
host.name:port,
[ip.v4.ad.dr]:port or
[ipv6::addr]:port - note that
hostnames are resolved when spiped is launched and are
not re-resolved later; thus if DNS entries change
spiped will continue to connect to the expired
address.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.targetAddress to which spiped should connect.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.timeoutTimeout, in seconds, after which an attempt to connect to the target or a protocol handshake will be aborted (and the connection dropped) if not completed
Type:
"integer"
Default:
5
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.waitForDNSWait for DNS. Normally when spiped is
launched it resolves addresses and binds to its source
socket before the parent process returns; with this option
it will daemonize first and retry failed DNS lookups until
they succeed. This allows spiped to
launch even if DNS isn't set up yet, but at the expense of
losing the guarantee that once spiped has
finished launching it will be ready to create pipes.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.config.<name>.weakHandshakeUse fast/weak handshaking: This reduces the CPU time spent in the initial connection setup, at the expense of losing perfect forward secrecy.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.spiped.enableEnable the spiped service module.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/spiped.nix>
|
services.sshd.enableAlias of services.openssh.enable.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/rename.nix>
|
services.sslh.appendConfigVerbatim configuration file.
Type:
"string"
Default:
''
protocols:
(
{ name: "ssh"; service: "ssh"; host: "localhost"; port: "22"; probe: "builtin"; },
{ name: "openvpn"; host: "localhost"; port: "1194"; probe: "builtin"; },
{ name: "xmpp"; host: "localhost"; port: "5222"; probe: "builtin"; },
{ name: "http"; host: "localhost"; port: "80"; probe: "builtin"; },
{ name: "ssl"; host: "localhost"; port: "443"; probe: "builtin"; },
{ name: "anyprot"; host: "localhost"; port: "443"; probe: "builtin"; }
);
''Declared by:
<nixpkgs/nixos/modules/services/networking/sslh.nix>
|
services.sslh.enableWhether to enable sslh.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/sslh.nix>
|
services.sslh.hostListening hostname.
Type:
"string"
Default:
"nixos"
Declared by:
<nixpkgs/nixos/modules/services/networking/sslh.nix>
|
services.sslh.pidfilePID file path for sslh daemon.
Type:
"path"
Default:
"/run/sslh.pid"
Declared by:
<nixpkgs/nixos/modules/services/networking/sslh.nix>
|
services.sslh.portListening port.
Type:
"integer"
Default:
443
Declared by:
<nixpkgs/nixos/modules/services/networking/sslh.nix>
|
services.sslh.timeoutTimeout in seconds.
Type:
"integer"
Default:
2
Declared by:
<nixpkgs/nixos/modules/services/networking/sslh.nix>
|
services.sslh.verboseVerbose logs.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/sslh.nix>
|
services.statsd.backendsList of backends statsd will use for data persistence
Type:
"list of string or derivations"
Default:
[
"graphite"
]
Example:
[
"graphite" (build of nodejs-statsd-influxdb-backend-0.4.0)
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.statsd.enableWhether to enable statsd stats aggregation service
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.statsd.extraConfigExtra configuration options for statsd
Type:
"null or string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.statsd.graphiteHostHostname or IP of Graphite server
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.statsd.graphitePortPort of Graphite server (i.e. carbon-cache).
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.statsd.hostAddress that statsd listens on over UDP
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.statsd.mgmt_addressAddress to run management TCP interface on
Type:
"string"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.statsd.mgmt_portPort to run the management TCP interface on
Type:
"integer"
Default:
8126
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.statsd.portPort that stats listens for messages on over UDP
Type:
"integer"
Default:
8125
Declared by:
<nixpkgs/nixos/modules/services/monitoring/statsd.nix>
|
services.strongswan.caA set of CAs (certification authorities) and their options for
the ‘ca xxx’ sections of the ipsec.conf
file.
Type:
"attribute set of attribute set of stringss"
Default:
{
}
Example:
{
strongswan =
{
auto = "add"; cacert = "/run/keys/strongswanCert.pem"; crluri = "http://crl2.strongswan.org/strongswan.crl";
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/strongswan.nix>
|
services.strongswan.connectionsA set of connections and their options for the ‘conn xxx’
sections of the ipsec.conf file.
Type:
"attribute set of attribute set of stringss"
Default:
{
}
Example:
{
%default =
{
keyexchange = "ikev2"; keyingtries = "1";
}
; roadwarrior =
{
auto = "add"; leftcert = "/run/keys/moonCert.pem"; leftid = "@moon.strongswan.org"; leftsubnet = "10.1.0.0/16"; right = "%any";
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/strongswan.nix>
|
services.strongswan.enableWhether to enable strongSwan.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/strongswan.nix>
|
services.strongswan.secretsA list of paths to IPSec secret files. These
files will be included into the main ipsec.secrets file with
the include directive. It is safer if these
paths are absolute.
Type:
"list of paths"
Default:
[
]
Example:
[
"/run/keys/ipsec-foo.secret"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/strongswan.nix>
|
services.strongswan.setupA set of options for the ‘config setup’ section of the
ipsec.conf file. Defines general
configuration parameters.
Type:
"attribute set of strings"
Default:
{
}
Example:
{
cachecrls = "yes"; strictcrlpolicy = "yes";
}
Declared by:
<nixpkgs/nixos/modules/services/networking/strongswan.nix>
|
services.supybot.configFilePath to a supybot config file. This can be generated by running supybot-wizard. Note: all paths should include the full path to the stateDir directory (backup conf data logs logs/plugins plugins tmp web).
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/services/networking/supybot.nix>
|
services.supybot.enableEnable Supybot, an IRC bot
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/supybot.nix>
|
services.supybot.stateDirThe root directory, logs and plugins are stored here
Type:
"unspecified"
Default:
"/home/supybot"
Declared by:
<nixpkgs/nixos/modules/services/networking/supybot.nix>
|
services.svnserve.enableWhether to enable svnserve to serve Subversion repositories through the SVN protocol.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/svnserve.nix>
|
services.svnserve.svnBaseDirBase directory from which Subversion repositories are accessed.
Type:
"unspecified"
Default:
"/repos"
Declared by:
<nixpkgs/nixos/modules/services/misc/svnserve.nix>
|
services.syncthing.dataDirPath where the `.syncthing` (settings and keys) and `Sync` (your synced files) directories will exist. This can be your home directory.
Type:
"unspecified"
Default:
"/var/lib/syncthing"
Declared by:
<nixpkgs/nixos/modules/services/networking/syncthing.nix>
|
services.syncthing.enableWhether to enable the Syncthing, self-hosted open-source alternative to Dropbox and BittorrentSync. Initial interface will be available on http://127.0.0.1:8080/.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/syncthing.nix>
|
services.syncthing.userSyncthing will be run under this user (user must exist, this can be your user name).
Type:
"unspecified"
Default:
"syncthing"
Declared by:
<nixpkgs/nixos/modules/services/networking/syncthing.nix>
|
services.synergy.client.autoStartWhether the Synergy client should be started automatically.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.synergy.client.enableWhether to enable the Synergy client (receive keyboard and mouse events from a Synergy server).
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.synergy.client.screenNameUse the given name instead of the hostname to identify ourselves to the server.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.synergy.client.serverAddressThe server address is of the form: [hostname][:port]. The hostname must be the address or hostname of the server. The port overrides the default port, 24800.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.synergy.server.addressAddress on which to listen for clients.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.synergy.server.autoStartWhether the Synergy server should be started automatically.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.synergy.server.configFileThe Synergy server configuration file.
Type:
"unspecified"
Default:
"/etc/synergy-server.conf"
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.synergy.server.enableWhether to enable the Synergy server (send keyboard and mouse events).
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.synergy.server.screenNameUse the given name instead of the hostname to identify this screen in the configuration.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/synergy.nix>
|
services.syslog-ng.configHeaderThe very first lines of the configuration file. Should usually contain the syslog-ng version header.
Type:
"string"
Default:
'' @version: 3.6 @include "scl.conf" ''
Declared by:
<nixpkgs/nixos/modules/services/logging/syslog-ng.nix>
|
services.syslog-ng.enableWhether to enable the syslog-ng daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/syslog-ng.nix>
|
services.syslog-ng.extraConfigConfiguration added to the end of syslog-ng.conf.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/logging/syslog-ng.nix>
|
services.syslog-ng.extraModulePathsA list of paths that should be included in syslog-ng's
--module-path option. They should usually
end in /lib/syslog-ng
Type:
"list of strings"
Default:
[
]
Example:
[ "${pkgs.syslogng_incubator}/lib/syslog-ng" ]
Declared by:
<nixpkgs/nixos/modules/services/logging/syslog-ng.nix>
|
services.syslogd.defaultConfigThe default syslog.conf file configures a
fairly standard setup of log files, which can be extended by
means of extraConfig.
Type:
"string"
Default:
'' # Send emergency messages to all users. *.emerg * # "local1" is used for dhcpd messages. local1.* -/var/log/dhcpd mail.* -/var/log/mail *.=warning;*.=err -/var/log/warn *.crit /var/log/warn *.*;mail.none;local1.none -/var/log/messages ''
Declared by:
<nixpkgs/nixos/modules/services/logging/syslogd.nix>
|
services.syslogd.enableWhether to enable syslogd. Note that systemd also logs syslog messages, so you normally don't need to run syslogd.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/syslogd.nix>
|
services.syslogd.enableNetworkInputAccept logging through UDP. Option -r of syslogd(8).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/logging/syslogd.nix>
|
services.syslogd.extraConfigAdditional text appended to syslog.conf,
i.e. the contents of defaultConfig.
Type:
"string"
Default:
""
Example:
"news.* -/var/log/news"
Declared by:
<nixpkgs/nixos/modules/services/logging/syslogd.nix>
|
services.syslogd.extraParamsAdditional parameters passed to syslogd.
Type:
"list of strings"
Default:
[
]
Example:
[
"-m 0"
]
Declared by:
<nixpkgs/nixos/modules/services/logging/syslogd.nix>
|
services.syslogd.ttyThe tty device on which syslogd will print important log messages. Leave this option blank to disable tty logging.
Type:
"string"
Default:
"tty10"
Declared by:
<nixpkgs/nixos/modules/services/logging/syslogd.nix>
|
services.systemhealth.drivesDrives to monitor.
Type:
"unspecified"
Default:
[
]
Example:
[
{
name = "root"; path = "/";
}
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/systemhealth.nix>
|
services.systemhealth.enableEnable the system health monitor and its generation of graphs.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/systemhealth.nix>
|
services.systemhealth.interfacesInterfaces to monitor (minimum one).
Type:
"unspecified"
Default:
[
"lo"
]
Example:
[
"lo" "eth0" "eth1"
]
Declared by:
<nixpkgs/nixos/modules/services/monitoring/systemhealth.nix>
|
services.systemhealth.urlPrefixThe URL prefix under which the System Health web pages appear in httpd.
Type:
"unspecified"
Default:
"/health"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/systemhealth.nix>
|
services.tarsnap.archivesTarsnap archive configurations. Each attribute names an archive
to be created at a given time interval, according to the options
associated with it. When uploading to the tarsnap server,
archive names are suffixed by a 1 second resolution timestamp.
For each member of the set is created a timer which triggers the
instanced tarsnap@ service unit. You may use
systemctl start tarsnap@archive-name to
manually trigger creation of archive-name at
any time.
Type:
"attribute set of submodules"
Default:
{
}
Example:
{
nixos =
{ directories = [ "/home" "/root/ssl" ];
};
gamedata =
{ directories = [ "/var/lib/minecraft "];
period = "*:30";
};
}
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.aggressiveNetworkingUpload data over multiple TCP connections, potentially increasing tarsnap's bandwidth utilisation at the cost of slowing down all other network traffic. Not recommended unless TCP congestion is the dominant limiting factor.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.checkpointBytesCreate a checkpoint every checkpointBytes
of uploaded data (optionally specified using an SI prefix).
1GB is the minimum value. A higher value is recommended,
as checkpointing is expensive.
Set to null to disable checkpointing.
Type:
"null or string"
Default:
"1GB"
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.directoriesList of filesystem paths to archive.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.excludesExclude files and directories matching these patterns.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.includesInclude only files and directories matching these patterns (the empty list includes everything). Exclusions have precedence over inclusions.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.lowmemReduce memory consumption by not caching small files. Possibly beneficial if the average file size is smaller than 1 MB and the number of files is lower than the total amount of RAM in KB.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.maxbwAbort archival if upstream bandwidth usage in bytes exceeds this threshold.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.maxbwRateDownDownload bandwidth rate limit in bytes.
Type:
"null or integer"
Default:
null
Example:
50 * 1000
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.maxbwRateUpUpload bandwidth rate limit in bytes.
Type:
"null or integer"
Default:
null
Example:
25 * 1000
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.nodumpExclude files with the nodump flag.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.periodCreate archive at this interval. The format is described in systemd.time(7).
Type:
"string"
Default:
"01:15"
Example:
"hourly"
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.printStatsPrint global archive statistics upon completion. The output is available via systemctl status tarsnap@archive-name.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.archives.<name>.verylowmemReduce memory consumption by a factor of 2 beyond what
lowmem does, at the cost of significantly
slowing down the archiving process.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.cachedirThe cache allows tarsnap to identify previously stored data
blocks, reducing archival time and bandwidth usage.
Should the cache become desynchronized or corrupted, tarsnap
will refuse to run until you manually rebuild the cache with
tarsnap --fsck.
Set to null to disable caching.
Type:
"null or path"
Default:
"/var/cache/tarsnap"
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.enableEnable periodic tarsnap backups.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tarsnap.keyfileThe keyfile which associates this machine with your tarsnap account. Create the keyfile with tarsnap-keygen. The keyfile name should be given as a string and not a path, to avoid the key being copied into the Nix store.
Type:
"string"
Default:
"/root/tarsnap.key"
Declared by:
<nixpkgs/nixos/modules/services/backup/tarsnap.nix>
|
services.tcsd.conformanceCredPath to the conformance credential for your TPM. See also the platformCred option
Type:
"path"
Default:
"/var/lib/tpm/conformance.cert"
Declared by:
<nixpkgs/nixos/modules/services/hardware/tcsd.nix>
|
services.tcsd.enableWhether to enable tcsd, a Trusted Computing management service that provides TCG Software Stack (TSS). The tcsd daemon is the only portal to the Trusted Platform Module (TPM), a hardware chip on the motherboard.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/tcsd.nix>
|
services.tcsd.endorsementCredPath to the endorsement credential for your TPM. See also the platformCred option
Type:
"path"
Default:
"/var/lib/tpm/endorsement.cert"
Declared by:
<nixpkgs/nixos/modules/services/hardware/tcsd.nix>
|
services.tcsd.groupGroup account under which tcsd runs.
Type:
"string"
Default:
"tss"
Declared by:
<nixpkgs/nixos/modules/services/hardware/tcsd.nix>
|
services.tcsd.platformCredPath to the platform credential for your TPM. Your TPM manufacturer may have provided you with a set of credentials (certificates) that should be used when creating identities using your TPM. When a user of your TPM makes an identity, this credential will be encrypted as part of that process. See the 1.1b TPM Main specification section 9.3 for information on this process.
Type:
"path"
Default:
"/var/lib/tpm/platform.cert"
Declared by:
<nixpkgs/nixos/modules/services/hardware/tcsd.nix>
|
services.tcsd.stateDirThe location of the system persistent storage file. The system persistent storage file holds keys and data across restarts of the TCSD and system reboots.
Type:
"path"
Default:
"/var/lib/tpm"
Declared by:
<nixpkgs/nixos/modules/services/hardware/tcsd.nix>
|
services.tcsd.userUser account under which tcsd runs.
Type:
"string"
Default:
"tss"
Declared by:
<nixpkgs/nixos/modules/services/hardware/tcsd.nix>
|
services.teamspeak3.dataDirDirectory to store TS3 database and other state/data files.
Type:
"path"
Default:
"/var/lib/teamspeak3-server"
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamspeak3.defaultVoicePortDefault UDP port for clients to connect to virtual servers - used for first virtual server, subsequent ones will open on incrementing port numbers by default.
Type:
"integer"
Default:
9987
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamspeak3.enableWhether to run the Teamspeak3 voice communication server daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamspeak3.fileTransferIPIP on which the server instance will listen for incoming file transfer connections. Defaults to any IP.
Type:
"string"
Default:
"0.0.0.0"
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamspeak3.fileTransferPortTCP port opened for file transfers.
Type:
"integer"
Default:
30033
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamspeak3.logPathDirectory to store log files in.
Type:
"path"
Default:
"/var/log/teamspeak3-server/"
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamspeak3.queryIPIP on which the server instance will listen for incoming ServerQuery connections. Defaults to any IP.
Type:
"string"
Default:
"0.0.0.0"
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamspeak3.queryPortTCP port opened for ServerQuery connections.
Type:
"integer"
Default:
10011
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamspeak3.voiceIPIP on which the server instance will listen for incoming voice connections. Defaults to any IP.
Type:
"string"
Default:
"0.0.0.0"
Declared by:
<nixpkgs/nixos/modules/services/networking/teamspeak3.nix>
|
services.teamviewer.enableWhether to enable teamviewer daemon.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/monitoring/teamviewer.nix>
|
services.telepathy.enableWhether to enable Telepathy service, a communications framework that enables real-time communication via pluggable protocol backends.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/desktops/telepathy.nix>
|
services.tftpd.enableWhether to enable tftpd, a Trivial File Transfer Protocol server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/tftpd.nix>
|
services.tftpd.pathWhere the tftp server files are stored.
Type:
"path"
Default:
"/home/tftp"
Declared by:
<nixpkgs/nixos/modules/services/networking/tftpd.nix>
|
services.thermald.enableWhether to enable thermald, the temperature management daemon.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/thermald.nix>
|
services.thinkfan.enableWhether to enable thinkfan, fan controller for ibm/lenovo thinkpads.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/thinkfan.nix>
|
services.thinkfan.sensorSensor used by thinkfan
Type:
"unspecified"
Default:
"/proc/acpi/ibm/thermal"
Declared by:
<nixpkgs/nixos/modules/services/hardware/thinkfan.nix>
|
services.timesyncd.enableEnables the systemd ntp client daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
services.tinc.networksDefines the tinc networks which will be started. Each network invokes a different daemon.
Type:
"list or attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/networking/tinc.nix>
|
services.tinc.networks.<name?>.debugLevelThe amount of debugging information to add to the log. 0 means little logging while 5 is the most logging. man tincd for more details.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/networking/tinc.nix>
|
services.tinc.networks.<name?>.extraConfigExtra lines to add to the tinc service configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/tinc.nix>
|
services.tinc.networks.<name?>.hostsThe name of the host in the network as well as the configuration for that host. This name should only contain alphanumerics and underscores.
Type:
"list or attribute set of strings"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/networking/tinc.nix>
|
services.tinc.networks.<name?>.interfaceTypeThe type of virtual interface used for the network connection
Type:
"string"
Default:
"tun"
Declared by:
<nixpkgs/nixos/modules/services/networking/tinc.nix>
|
services.tinc.networks.<name?>.nameThe name of the node which is used as an identifier when communicating with the remote nodes in the mesh. If null then the hostname of the system is used.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/tinc.nix>
|
services.tinc.networks.<name?>.packageThe package to use for the tinc daemon's binary.
Type:
"unspecified"
Default:
(build of tinc-1.1pre-2015-03-14)
Declared by:
<nixpkgs/nixos/modules/services/networking/tinc.nix>
|
services.tlp.enableWhether to enable the TLP daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/tlp.nix>
|
services.tlp.extraConfigAdditional configuration variables for TLP
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/hardware/tlp.nix>
|
services.tlsdated.enableEnable tlsdated daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/tlsdated.nix>
|
services.tlsdated.extraOptionsAdditional command line arguments to pass to tlsdated.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/tlsdated.nix>
|
services.tlsdated.sourcesYou can list one or more sources to fetch time from.
Type:
"list of submodules"
Default:
[
{
host = "www.ptb.de"; port = 443; proxy = null;
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/tlsdated.nix>
|
services.tlsdated.sources.*.hostRemote hostname.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/networking/tlsdated.nix>
|
services.tlsdated.sources.*.portRemote port.
Type:
"integer"
Declared by:
<nixpkgs/nixos/modules/services/networking/tlsdated.nix>
|
services.tlsdated.sources.*.proxyThe proxy argument expects HTTP, SOCKS4A or SOCKS5 formatted as followed: http://127.0.0.1:8118 socks4a://127.0.0.1:9050 socks5://127.0.0.1:9050 The proxy support should not leak DNS requests and is suitable for use with Tor.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/tlsdated.nix>
|
services.tomcat.axis2.enableWhether to enable an Apache Axis2 container
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.axis2.servicesList containing AAR files or directories with AAR files which are web services to be deployed on Axis2
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.baseDirLocation where Tomcat stores configuration files, webapplications and logfiles
Type:
"unspecified"
Default:
"/var/tomcat"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.catalinaOptsParameters to pass to the Java Virtual Machine which spawns the Catalina servlet container
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.commonLibsList containing JAR files or directories with JAR files which are libraries shared by the web applications and the servlet container
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.enableWhether to enable Apache Tomcat
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.extraGroupsDefines extra groups to which the tomcat user belongs.
Type:
"unspecified"
Default:
[
]
Example:
[
"users"
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.groupGroup account under which Apache Tomcat runs.
Type:
"unspecified"
Default:
"tomcat"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.javaOptsParameters to pass to the Java Virtual Machine which spawns Apache Tomcat
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.jdkWhich JDK to use.
Type:
"unspecified"
Default:
(build of )
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.logPerVirtualHostWhether to enable logging per virtual host.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.sharedLibsList containing JAR files or directories with JAR files which are libraries shared by the web applications
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.userUser account under which Apache Tomcat runs.
Type:
"unspecified"
Default:
"tomcat"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.virtualHostsList consisting of a virtual host name and a list of web applications to deploy on each virtual host
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tomcat.webappsList containing WAR files or directories with WAR files which are web applications to be deployed on Tomcat
Type:
"unspecified"
Default:
[
(build of apache-tomcat-7.0.55)
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/tomcat.nix>
|
services.tor.client.enableWhether to enable Tor daemon to route application connections. You might want to disable this if you plan running a dedicated Tor relay.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.client.privoxy.enableWhether to enable and configure the system Privoxy to use Tor's faster port, suitable for HTTP. To have anonymity, protocols need to be scrubbed of identifying information, and this can be accomplished for HTTP by Privoxy. Privoxy can also be useful for KDE torification. A good setup would be: setting SOCKS proxy to the default Tor port, providing maximum circuit isolation where possible; and setting HTTP proxy to Privoxy to route HTTP traffic over faster, but less isolated port.
Type:
"unspecified"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.client.socksListenAddressBind to this address to listen for connections from Socks-speaking applications. Provides strong circuit isolation, separate circuit per IP address.
Type:
"string"
Default:
"127.0.0.1:9050"
Example:
"192.168.0.1:9100"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.client.socksListenAddressFasterBind to this address to listen for connections from Socks-speaking applications. Same as socksListenAddress but uses weaker circuit isolation to provide performance suitable for a web browser.
Type:
"string"
Default:
"127.0.0.1:9063"
Example:
"192.168.0.1:9101"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.client.socksPolicyEntry policies to allow/deny SOCKS requests based on IP address. First entry that matches wins. If no SocksPolicy is set, we accept all (and only) requests from SocksListenAddress.
Type:
"null or string"
Default:
null
Example:
"accept 192.168.0.0/16, reject *"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.controlPortIf set, Tor will accept connections on the specified port and allow them to control the tor process.
Type:
"integer"
Default:
0
Example:
9051
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.enableEnable the Tor daemon. By default, the daemon is run without relay, exit, bridge or client connectivity.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.extraConfigExtra configuration. Contents will be added verbatim to the configuration file at the end.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.accountingMaxSpecify maximum bandwidth allowed during an accounting
period. This allows you to limit overall tor bandwidth
over some time period. See the
AccountingMax option by looking at the
tor manual (man tor) for more.
Note this limit applies individually to upload and
download; if you specify "500 GBytes"
here, then you may transfer up to 1 TBytes of overall
bandwidth (500 GB upload, 500 GB download).
Type:
"null or string"
Default:
null
Example:
"450 GBytes"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.accountingStartSpecify length of an accounting period. This allows you to
limit overall tor bandwidth over some time period. See the
AccountingStart option by looking at
the tor manual (man tor) for more.
Type:
"null or string"
Default:
null
Example:
"month 1 1:00"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.bandwidthBurstSpecify this to allow bursts of the bandwidth usage of relayed (server) traffic. The average usage will still be as specified in relayBandwidthRate. Your own traffic is still unthrottled. Units: bytes/second.
Type:
"integer"
Default:
0
Example:
200
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.bandwidthRateSpecify this to limit the bandwidth usage of relayed (server) traffic. Your own traffic is still unthrottled. Units: bytes/second.
Type:
"integer"
Default:
0
Example:
100
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.contactInfoContact information for the relay owner (e.g. a mail address and GPG key ID).
Type:
"null or string"
Default:
null
Example:
"admin@relay.com"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.enableWhether to enable relaying TOR traffic for others. See https://www.torproject.org/docs/tor-doc-relay for details.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.exitPolicyA comma-separated list of exit policies. They're considered first to last, and the first match wins. If you want to _replace_ the default exit policy, end this with either a reject *:* or an accept *:*. Otherwise, you're _augmenting_ (prepending to) the default exit policy. Leave commented to just use the default, which is available in the man page or at https://www.torproject.org/documentation.html Look at https://www.torproject.org/faq-abuse.html#TypicalAbuses for issues you might encounter if you use the default exit policy. If certain IPs and ports are blocked externally, e.g. by your firewall, you should update your exit policy to reflect this -- otherwise Tor users will be told that those destinations are down.
Type:
"null or string"
Default:
null
Example:
"accept *:6660-6667,reject *:*"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.isBridgeBridge relays (or "bridges") are Tor relays that aren't listed in the main directory. Since there is no complete public list of them, even if an ISP is filtering connections to all the known Tor relays, they probably won't be able to block all the bridges. A bridge relay can't be an exit relay. You need to set relay.enable to true for this option to take effect. The bridge is set up with an obfuscated transport proxy. See https://www.torproject.org/bridges.html.en for more info.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.isExitAn exit relay allows Tor users to access regular Internet services. Unlike running a non-exit relay, running an exit relay may expose you to abuse complaints. See https://www.torproject.org/faq.html.en#ExitPolicies for more info. You can specify which services Tor users may access via your exit relay using exitPolicy option.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.nicknameA unique handle for your TOR relay.
Type:
"string"
Default:
"anonymous"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.relay.portSpecWhat port to advertise for Tor connections. This corresponds
to the ORPort section in the Tor manual; see
man tor for more details.
At a minimum, you should just specify the port for the
relay to listen on; a common one like 143, 22, 80, or 443
to help Tor users who may have very restrictive port-based
firewalls.
Type:
"string"
Example:
"143"
Declared by:
<nixpkgs/nixos/modules/services/security/tor.nix>
|
services.tor.torsocks.allowInboundSet Torsocks to accept inbound connections. If set to
true, listen() and accept() will be
allowed to be used with non localhost address.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/torsocks.nix>
|
services.tor.torsocks.enableWhether to build /etc/tor/torsocks.conf
containing the specified global torsocks configuration.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/torsocks.nix>
|
services.tor.torsocks.fasterServerIP/Port of the Tor SOCKS server for torsocks-faster wrapper suitable for HTTP. Currently, hostnames are NOT supported by torsocks.
Type:
"string"
Default:
"127.0.0.1:9063"
Example:
"192.168.0.20:1234"
Declared by:
<nixpkgs/nixos/modules/services/security/torsocks.nix>
|
services.tor.torsocks.onionAddrRangeTor hidden sites do not have real IP addresses. This specifies what range of IP addresses will be handed to the application as "cookies" for .onion names. Of course, you should pick a block of addresses which you aren't going to ever need to actually connect to. This is similar to the MapAddress feature of the main tor daemon.
Type:
"string"
Default:
"127.42.42.0/24"
Declared by:
<nixpkgs/nixos/modules/services/security/torsocks.nix>
|
services.tor.torsocks.serverIP/Port of the Tor SOCKS server. Currently, hostnames are NOT supported by torsocks.
Type:
"string"
Default:
"127.0.0.1:9050"
Example:
"192.168.0.20:1234"
Declared by:
<nixpkgs/nixos/modules/services/security/torsocks.nix>
|
services.tor.torsocks.socks5PasswordSOCKS5 password. The TORSOCKS_PASSWORD
environment variable overrides this option if it is set.
Type:
"null or string"
Default:
null
Example:
"sekret"
Declared by:
<nixpkgs/nixos/modules/services/security/torsocks.nix>
|
services.tor.torsocks.socks5UsernameSOCKS5 username. The TORSOCKS_USERNAME
environment variable overrides this option if it is set.
Type:
"null or string"
Default:
null
Example:
"bob"
Declared by:
<nixpkgs/nixos/modules/services/security/torsocks.nix>
|
services.tor.tsocks.configExtra configuration. Contents will be added verbatim to TSocks configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/security/torify.nix>
|
services.tor.tsocks.enableWhether to build tsocks wrapper script to relay application traffic via TOR.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/security/torify.nix>
|
services.tor.tsocks.serverIP address of TOR client to use.
Type:
"unspecified"
Default:
"localhost:9050"
Example:
"192.168.0.20"
Declared by:
<nixpkgs/nixos/modules/services/security/torify.nix>
|
services.torque.mom.enableWhether to enable torque computing node.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/computing/torque/mom.nix>
|
services.torque.mom.serverNodeHostname running pbs server.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/computing/torque/mom.nix>
|
services.torque.server.enableWhether to enable torque server.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/computing/torque/server.nix>
|
services.toxBootstrapd.enableWhether to enable the Tox DHT bootstrap daemon.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/tox-bootstrapd.nix>
|
services.toxBootstrapd.extraConfigConfiguration for bootstrap daemon. See https://github.com/irungentoo/toxcore/blob/master/other/bootstrap_daemon/tox-bootstrapd.conf and http://wiki.tox.im/Nodes.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/tox-bootstrapd.nix>
|
services.toxBootstrapd.keysFileNode key file.
Type:
"string"
Default:
"/var/lib/tox-bootstrapd/keys"
Declared by:
<nixpkgs/nixos/modules/services/networking/tox-bootstrapd.nix>
|
services.toxBootstrapd.portListening port (UDP).
Type:
"integer"
Default:
33445
Declared by:
<nixpkgs/nixos/modules/services/networking/tox-bootstrapd.nix>
|
services.transmission.enableWhether or not to enable the headless Transmission BitTorrent daemon. Transmission daemon can be controlled via the RPC interface using transmission-remote or the WebUI (http://localhost:9091/ by default). Torrents are downloaded to /var/lib/transmission/Downloads/ by default and are accessible to users in the "transmission" group.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/torrent/transmission.nix>
|
services.transmission.portTCP port number to run the RPC/web interface.
Type:
"integer"
Default:
9091
Declared by:
<nixpkgs/nixos/modules/services/torrent/transmission.nix>
|
services.transmission.settingsAttribute set whos fields overwrites fields in settings.json (each time the service starts). String values must be quoted, integer and boolean values must not. See https://trac.transmissionbt.com/wiki/EditConfigFiles for documentation.
Type:
"attribute set"
Default:
{
download-dir = "/var/lib/transmission/Downloads"; incomplete-dir = "/var/lib/transmission/.incomplete"; incomplete-dir-enabled = true;
}
Example:
{
download-dir = "/srv/torrents/"; incomplete-dir = "/srv/torrents/.incomplete/"; incomplete-dir-enabled = true; rpc-whitelist = "127.0.0.1,192.168.*.*";
}
Declared by:
<nixpkgs/nixos/modules/services/torrent/transmission.nix>
|
services.u9fs.enableWhether to run the u9fs 9P server for Unix.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/u9fs.nix>
|
services.u9fs.extraArgsExtra arguments to pass on invocation, see man 4 u9fs
Type:
"string"
Default:
""
Example:
"-a none -u nobody"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/u9fs.nix>
|
services.u9fs.fsrootFile system root to serve to clients.
Type:
"path"
Default:
"/"
Example:
"/srv"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/u9fs.nix>
|
services.u9fs.listenStreamsSockets to listen for clients on. See man 5 systemd.socket for socket syntax.
Type:
"list of strings"
Default:
[
"564"
]
Example:
[
"192.168.16.1:564"
]
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/u9fs.nix>
|
services.udev.extraRulesAdditional udev rules. They'll be written
into file 10-local.rules. Thus they are
read before all other rules.
Type:
"string"
Default:
""
Example:
''
KERNEL=="eth*", ATTR{address}=="00:1D:60:B9:6D:4F", NAME="my_fast_network_card"
''Declared by:
<nixpkgs/nixos/modules/services/hardware/udev.nix>
|
services.udev.packagesList of packages containing udev rules.
All files found in
and
pkg/etc/udev/rules.d
will be included.
pkg/lib/udev/rules.d
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/hardware/udev.nix>
|
services.udev.pathPackages added to the PATH environment variable when
executing programs from Udev rules.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/hardware/udev.nix>
|
services.udisks2.enableWhether to enable Udisks, a DBus service that allows applications to query and manipulate storage devices.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/hardware/udisks2.nix>
|
services.uhub.aclConfigContents of user ACL configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.addressAddress to bind the hub to.
Type:
"string"
Default:
"any"
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.enableWhether to enable the uhub ADC hub.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.enableTLSWhether to enable TLS support.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.hubConfigContents of uhub configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.authSqlite.enableWhether to enable the Sqlite authentication database plugin
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.authSqlite.filePath to user database. Use the uhub-passwd utility to create the database and add/remove users.
Type:
"string"
Example:
"/var/db/uhub-users"
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.history.connectThe number of chat history messages to send when users connect (0 = do not send any history).
Type:
"integer"
Default:
5
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.history.defaultWhen !history is provided without arguments, then this default number of messages are returned.
Type:
"integer"
Default:
10
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.history.enableWhether to enable the history plugin.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.history.maxThe maximum number of messages to keep in history
Type:
"integer"
Default:
200
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.logging.enableWhether to enable the logging plugin.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.logging.filePath of log file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.logging.syslogIf true then the system log is used instead of writing to file.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.welcome.enableWhether to enable the welcome plugin.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.welcome.motdWelcome message displayed to clients after connecting
and with the !motd command.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.plugins.welcome.rulesRules message, displayed to clients with the !rules command.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.uhub.portTCP port to bind the hub to.
Type:
"integer"
Default:
1511
Declared by:
<nixpkgs/nixos/modules/services/misc/uhub.nix>
|
services.unbound.allowedAccessWhat networks are allowed to use unbound as a resolver.
Type:
"unspecified"
Default:
[
"127.0.0.0/24"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/unbound.nix>
|
services.unbound.enableWhether to enable the Unbound domain name server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/unbound.nix>
|
services.unbound.extraConfigExtra lines of unbound config.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/unbound.nix>
|
services.unbound.forwardAddressesWhat servers to forward queries to.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/unbound.nix>
|
services.unbound.interfacesWhat addresses the server should listen on.
Type:
"unspecified"
Default:
[
"127.0.0.1" "::1"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/unbound.nix>
|
services.unclutter.argumentsArguments to pass to unclutter command
Type:
"string"
Default:
"-idle 1"
Declared by:
<nixpkgs/nixos/modules/services/x11/unclutter.nix>
|
services.unclutter.enableEnable unclutter to hide your mouse cursor when inactive
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/unclutter.nix>
|
services.unifi.enableWhether or not to enable the unifi controller service.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/unifi.nix>
|
services.upower.enableWhether to enable Upower, a DBus service that provides power management support to applications.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/hardware/upower.nix>
|
services.uptime.configFileThe uptime configuration file If mongodb: server != localhost, please set usesRemoteMongo = true If you only want to run the monitor, please set enableWebService = false and enableSeparateMonitoringService = true If autoStartMonitor: false (recommended) and you want to run both services, please set enableSeparateMonitoringService = true
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/monitoring/uptime.nix>
|
services.uptime.enableSeparateMonitoringServiceWhether to enable the uptime monitoring service.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/monitoring/uptime.nix>
|
services.uptime.enableWebServiceWhether to enable the uptime monitoring program web service.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/monitoring/uptime.nix>
|
services.uptime.nodeEnvThe node environment to run in (development, production, etc.)
Type:
"string"
Default:
"production"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/uptime.nix>
|
services.uptime.usesRemoteMongoWhether the configuration file specifies a remote mongo instance
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/uptime.nix>
|
services.uptimed.enableUptimed allows you to track your highest uptimes.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/system/uptimed.nix>
|
services.uwsgi.enableEnable uWSGI
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/uwsgi.nix>
|
services.uwsgi.instanceuWSGI configuration. This awaits either a path to file or a set which will be made into one.
If given a set, it awaits an attribute type which can be either normal
or emperor.
For normal mode you can specify python2Packages and
python3Packages as functions from libraries set into lists of libraries.
For emperor mode, you should use vassals attribute
which should be either a set of names and configurations or a path to a directory.
Type:
"attribute set"
Default:
{
type = "normal";
}
Example:
{
type = "emperor";
vassals = {
moin = {
type = "normal";
python2Packages = self: with self; [ moinmoin ];
socket = "/run/uwsgi.sock";
};
};
}
Declared by:
<nixpkgs/nixos/modules/services/web-servers/uwsgi.nix>
|
services.uwsgi.pluginsPlugins used with uWSGI
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/uwsgi.nix>
|
services.varnish.configVerbatim default.vcl configuration.
Type:
"unspecified"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/varnish/default.nix>
|
services.varnish.enableEnable the Varnish Server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/web-servers/varnish/default.nix>
|
services.varnish.http_addressHTTP listen address and port.
Type:
"unspecified"
Default:
"*:6081"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/varnish/default.nix>
|
services.varnish.stateDirDirectory holding all state for Varnish to run.
Type:
"unspecified"
Default:
"/var/spool/varnish"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/varnish/default.nix>
|
services.venus.cacheDirectoryWhere cached feeds are stored.
Type:
"path"
Default:
"/var/cache/venus"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.datesSpecification (in the format described by systemd.time(5)) of the time at which the Venus will collect feeds.
Type:
"string"
Default:
"*:0/15"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.enablePlanet Venus is an awesome ‘river of news’ feed reader. It downloads news feeds published by web sites and aggregates their content together into a single combined feed, latest news first.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.feedsList of feeds.
Type:
"unspecified"
Default:
[
]
Example:
[
{
feedUrl = "http://url/to/rss/feed.xml"; homepageUrl = "http://garbas.si"; name = "Rok Garbas";
}
]
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.groupGroup for running venus script.
Type:
"string"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.itemsPerPageHow many items to put on each page.
Type:
"integer"
Default:
15
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.linkLink to the main page.
Type:
"string"
Default:
"http://planet.nixos.org"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.nameYour planet's name.
Type:
"string"
Default:
"NixOS Planet"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.outputDirectoryDirectory to place output files.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.outputThemeDirectory containing a config.ini file which is merged with this one. This is typically used to specify templating and bill of material information.
Type:
"path"
Default:
"/nix/store/xsy9kfhfdf6c1z4fc90ggqqxs6wrscj6-venus-9de21094a8cf565bdfcf75688e121a5ad1f5397b/themes/classic_fancy"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.ownerEmailYour e-mail address.
Type:
"string"
Default:
"some@example.com"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.ownerNameYour name.
Type:
"string"
Default:
"Rok Garbas"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.venus.userUser for running venus script.
Type:
"string"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/programs/venus.nix>
|
services.virtualboxGuest.enableWhether to enable the VirtualBox service and other guest additions.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/virtualbox-guest.nix>
|
services.virtualboxHost.addNetworkInterfaceAutomatically set up a vboxnet0 host-only network interface.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/programs/virtualbox-host.nix>
|
services.virtualboxHost.enableWhether to enable host-side support for VirtualBox.
In order to pass USB devices from the host to the guests, the user
needs to be in the vboxusers group.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/programs/virtualbox-host.nix>
|
services.virtualboxHost.enableHardeningEnable hardened VirtualBox, which ensures that only the binaries in the system path get access to the devices exposed by the kernel modules instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users in the vboxusers group can tamper with the VirtualBox device files.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/programs/virtualbox-host.nix>
|
services.virtuoso.configExtra options to put into Virtuoso configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/virtuoso.nix>
|
services.virtuoso.dirsAllowedA list of directories Virtuoso is allowed to access
Type:
"unspecified"
Default:
null
Example:
"/www, /home/"
Declared by:
<nixpkgs/nixos/modules/services/databases/virtuoso.nix>
|
services.virtuoso.enableWhether to enable Virtuoso Opensource database server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/databases/virtuoso.nix>
|
services.virtuoso.httpListenAddressip:port or port for Virtuoso HTTP server to listen on.
Type:
"unspecified"
Default:
null
Example:
"myserver:8080"
Declared by:
<nixpkgs/nixos/modules/services/databases/virtuoso.nix>
|
services.virtuoso.listenAddressip:port or port to listen on.
Type:
"unspecified"
Default:
"1111"
Example:
"myserver:1323"
Declared by:
<nixpkgs/nixos/modules/services/databases/virtuoso.nix>
|
services.virtuoso.parametersExtra options to put into [Parameters] section of Virtuoso configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/databases/virtuoso.nix>
|
services.vsftpd.anonymousMkdirEnableWhether any uploads are permitted to anonymous users.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.anonymousUmaskAnonymous write umask.
Type:
"string"
Default:
"077"
Example:
"002"
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.anonymousUploadEnableWhether any uploads are permitted to anonymous users.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.anonymousUserWhether to enable the anonymous FTP user.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.anonymousUserHomeDirectory to consider the HOME of the anonymous user.
Type:
"path"
Default:
"/home/ftp/"
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.chrootlocalUserWhether local users are confined to their home directory.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.enableWhether to enable the vsftpd FTP server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.forceLocalDataSSLOnly applies if sslEnable is true. Non anonymous (local) users
must use a secure SSL connection for sending/receiving data on data connection.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.forceLocalLoginsSSLOnly applies if sslEnable is true. Non anonymous (local) users
must use a secure SSL connection to send a password.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.localUsersWhether to enable FTP for local users.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.portPromiscuousSet to YES if you want to disable the PORT security check that ensures that outgoing data connections can only connect to the client. Only enable if you know what you are doing!
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.rsaCertFileRSA certificate file.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.ssl_sslv2Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.ssl_sslv3Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.ssl_tlsv1Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.userlistSee userlistFile.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.userlistDenySpecifies whether userlistFile is a list of user
names to allow or deny access.
The default false means whitelist/allow.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.userlistEnableWhether users are included.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.userlistFileNewline separated list of names to be allowed/denied if userlistEnable
is true. Meaning see userlistDeny.
The default is a file containing the users from userlist.
If explicitely set to null userlist_file will not be set in vsftpd's config file.
Type:
"unspecified"
Default:
(build of userlist)
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.vsftpd.writeEnableWhether any write activity is permitted to users.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/vsftpd.nix>
|
services.wakeonlan.interfacesInterfaces where to enable Wake-On-LAN, and how. Two methods available: "magickey" and "password". The password has the shape of six bytes in hexadecimal separated by a colon each. For more information, check the ethtool manual.
Type:
"unspecified"
Default:
[
]
Example:
[
{
interface = "eth0"; method = "password"; password = "00:11:22:33:44:55";
}
]
Declared by:
<nixpkgs/nixos/modules/services/networking/wakeonlan.nix>
|
services.winstoneDefines independent Winstone services, each serving one WAR-file.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/services/web-servers/winstone.nix>
|
services.winstone.<name>.extraJavaOptionsExtra command line options given to the java process running Winstone.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/winstone.nix>
|
services.winstone.<name>.extraOptionsExtra command line options given to the Winstone process.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/web-servers/winstone.nix>
|
services.winstone.<name>.groupThe group that will own the working directory.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/winstone.nix>
|
services.winstone.<name>.serviceNameThe name of the systemd service. By default, it is derived from the winstone instance name.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/winstone.nix>
|
services.winstone.<name>.userThe user that should run this Winstone process and own the working directory.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/winstone.nix>
|
services.winstone.<name>.warFileThe WAR file that Winstone should serve.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/winstone.nix>
|
services.winstone.<name>.workDirThe working directory for this Winstone instance. Will contain extracted webapps etc. The directory will be created if it doesn't exist.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/winstone.nix>
|
services.xfs.enableWhether to enable the X Font Server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/xfs.nix>
|
services.xinetd.enableWhether to enable the xinetd super-server daemon.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.extraDefaultsAdditional configuration lines added to the default section of xinetd's configuration.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.servicesA list of services provided by xinetd.
Type:
"list of submodules"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.extraConfigExtra configuration-lines added to the section of the service.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.flagsType:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.nameName of the service.
Type:
"string"
Example:
"login"
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.portPort number of the service.
Type:
"integer"
Default:
0
Example:
123
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.protocolProtocol of the service. Usually tcp or udp.
Type:
"string"
Default:
"tcp"
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.serverPath of the program that implements the service.
Type:
"string"
Example:
"/foo/bin/ftpd"
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.serverArgsCommand-line arguments for the server program.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.unlistedWhether this server is listed in
/etc/services. If so, the port
number can be omitted.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xinetd.services.*.userUser account for the service
Type:
"string"
Default:
"nobody"
Declared by:
<nixpkgs/nixos/modules/services/networking/xinetd.nix>
|
services.xserver.autorunWhether to start the X server automatically.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.configThe contents of the configuration file of the X server
(xorg.conf).
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.defaultDepthDefault colour depth.
Type:
"integer"
Default:
0
Example:
8
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.desktopManager.defaultDefault desktop manager loaded if none have been chosen.
Type:
"string"
Default:
""
Example:
"none"
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/default.nix>
|
services.xserver.desktopManager.e19.enableEnable the E19 desktop environment.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/e19.nix>
|
services.xserver.desktopManager.gnome3.enableEnable Gnome 3 desktop manager.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix>
|
services.xserver.desktopManager.gnome3.sessionPathAdditional list of packages to be added to the session search path. Useful for gnome shell extensions or gsettings-conditionated autostart.
Type:
"unspecified"
Default:
[
]
Example:
[ pkgs.gnome3.gpaste ]
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix>
|
services.xserver.desktopManager.kde4.enableEnable the KDE 4 desktop environment.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/kde4.nix>
|
services.xserver.desktopManager.kde4.phononBackendsWhich phonon multimedia backend kde should use
Type:
"list of strings"
Default:
[
"gstreamer"
]
Example:
[
"gstreamer" "vlc"
]
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/kde4.nix>
|
services.xserver.desktopManager.kde5.enableEnable the Plasma 5 (KDE 5) desktop environment.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/kde5.nix>
|
services.xserver.desktopManager.kde5.phononBackendsPhonon backends to use in KDE. Only the VLC and GStreamer backends are available. The GStreamer backend is preferred by upstream.
Type:
"list of strings"
Default:
[
"gstreamer"
]
Example:
[
"gstreamer" "vlc"
]
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/kde5.nix>
|
services.xserver.desktopManager.kodi.enableEnable the kodi multimedia center.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/kodi.nix>
|
services.xserver.desktopManager.xfce.enableEnable the Xfce desktop environment.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/xfce.nix>
|
services.xserver.desktopManager.xterm.enableEnable a xterm terminal as a desktop manager.
Type:
"unspecified"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/desktop-managers/xterm.nix>
|
services.xserver.deviceSectionContents of the first Device section of the X server configuration file.
Type:
"string"
Default:
""
Example:
"VideoRAM 131072"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.displayDisplay number for the X server.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.displayManager.auto.enableWhether to enable the fake "auto" display manager, which
automatically logs in the user specified in the
user option. This is mostly useful for
automated tests.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/auto.nix>
|
services.xserver.displayManager.auto.userThe user account to login automatically.
Type:
"unspecified"
Default:
"root"
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/auto.nix>
|
services.xserver.displayManager.desktopManagerHandlesLidAndPowerWhether the display manager should prevent systemd from handling lid and power events. This is normally handled by the desktop environment's power manager. Turn this off when using a minimal X11 setup without a full power manager.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.gdm.enableWhether to enable GDM as the display manager. GDM is very experimental and may render system unusable.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix>
|
services.xserver.displayManager.hiddenUsersA list of users which will not be shown in the display manager.
Type:
"list of strings"
Default:
[
"nobody"
]
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.job.environmentAdditional environment variables needed by the display manager.
Type:
"attribute set of unspecifieds"
Default:
{
}
Example:
{
SLIM_CFGFILE = "/etc/slim.conf";
}
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.job.execCmdCommand to start the display manager.
Type:
"string"
Example:
"${pkgs.slim}/bin/slim"
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.job.logsXsessionWhether the display manager redirects the
output of the session script to
~/.xsession-errors.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.job.preStartScript executed before the display manager is started.
Type:
"string"
Default:
""
Example:
"rm -f /var/log/my-display-manager.log"
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.kdm.enableWhether to enable the KDE display manager.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/kdm.nix>
|
services.xserver.displayManager.kdm.enableXDMCPWhether to enable XDMCP, which allows remote logins.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/kdm.nix>
|
services.xserver.displayManager.kdm.extraConfigOptions appended to kdmrc, the
configuration file of KDM.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/kdm.nix>
|
services.xserver.displayManager.kdm.setupScriptThe path to a KDM setup script. This script is run as root just before KDM starts. Can be used for setting up monitors with xrandr, for example.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/kdm.nix>
|
services.xserver.displayManager.kdm.themeDirectoryThe path to a KDM theme directory. This theme will be used by the KDM greeter.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/kdm.nix>
|
services.xserver.displayManager.lightdm.backgroundThe background image or color to use.
Type:
"unspecified"
Default:
"/nix/store/ccskk7d9kh1j93ydiwq70s9gjdb3bbgv-nixos-artwork-e71b684/gnome/Gnome_Dark.png"
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/lightdm.nix>
|
services.xserver.displayManager.lightdm.enableWhether to enable lightdm as the display manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/lightdm.nix>
|
services.xserver.displayManager.lightdm.greeterThe LightDM greeter to login via. The package should be a directory containing a .desktop file matching the name in the 'name' option.
Type:
"unspecified"
Default:
{
name = "lightdm-gtk-greeter"; package = (build of lightdm-gtk-greeter);
}
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/lightdm.nix>
|
services.xserver.displayManager.sddm.enableWhether to enable sddm as the display manager.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix>
|
services.xserver.displayManager.sddm.themeGreeter theme to use.
Type:
"string"
Default:
"maui"
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix>
|
services.xserver.displayManager.sessionList of sessions supported with the command used to start each
session. Each session script can set the
waitPID shell variable to make this script
wait until the end of the user session. Each script is used
to define either a windows manager or a desktop manager. These
can be differentiated by setting the attribute
manage either to "window"
or "desktop".
The list of desktop manager and window manager should appear
inside the display manager with the desktop manager name
followed by the window manager name.
Type:
"unspecified"
Default:
[
]
Example:
[ { manage = "desktop";
name = "xterm";
start = ''
${pkgs.xterm}/bin/xterm -ls &
waitPID=$!
'';
}
]
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.sessionCommandsShell commands executed just before the window or desktop manager is started.
Type:
"string"
Default:
""
Example:
'' xmessage "Hello World!" & ''
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.slim.autoLoginAutomatically log in as the default user.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/slim.nix>
|
services.xserver.displayManager.slim.defaultUserThe default user to load. If you put a username here you get it automatically loaded into the username field, and the focus is placed on the password.
Type:
"null or string"
Default:
null
Example:
"login"
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/slim.nix>
|
services.xserver.displayManager.slim.enableWhether to enable SLiM as the display manager.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/slim.nix>
|
services.xserver.displayManager.slim.extraConfigExtra configuration options for SLiM login manager. Do not add options that can be configured directly.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/slim.nix>
|
services.xserver.displayManager.slim.themeThe theme for the SLiM login manager. If not specified, SLiM's default theme is used. See http://slim.berlios.de/themes01.php for a collection of themes. TODO: berlios shut down.
Type:
"null or path"
Default:
null
Example:
pkgs.fetchurl {
url = "mirror://sourceforge/slim.berlios/slim-wave.tar.gz";
sha256 = "0ndr419i5myzcylvxb89m9grl2xyq6fbnyc3lkd711mzlmnnfxdy";
}
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/slim.nix>
|
services.xserver.displayManager.xserverArgsList of arguments for the X server.
Type:
"list of strings"
Default:
[
]
Example:
[
"-ac" "-logverbose" "-verbose" "-nolisten tcp"
]
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.displayManager.xserverBinPath to the X server used by display managers.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/services/x11/display-managers/default.nix>
|
services.xserver.enableWhether to enable the X server.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.enableTCPWhether to allow the X server to accept TCP connections.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.exportConfigurationWhether to symlink the X server configuration under
/etc/X11/xorg.conf.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.extraDisplaySettingsLines to be added to every Display subsection of the Screen section.
Type:
"string"
Default:
""
Example:
"Virtual 2048 2048"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.layoutKeyboard layout.
Type:
"string"
Default:
"us"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.moduleSectionContents of the Module section of the X server configuration file.
Type:
"string"
Default:
""
Example:
'' SubSection "extmod" EndSubsection ''
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.modulesPackages to be added to the module search path of the X server.
Type:
"list of paths"
Default:
[
]
Example:
[ pkgs.xf86_input_wacom ]
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.monitorSectionContents of the first Monitor section of the X server configuration file.
Type:
"string"
Default:
""
Example:
"HorizSync 28-49"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.multitouch.additionalOptionsAdditional options for mtrack touchpad driver.
Type:
"string"
Default:
""
Example:
'' Option "ScaleDistance" "50" Option "RotateDistance" "60" ''
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix>
|
services.xserver.multitouch.buttonsMapRemap touchpad buttons.
Type:
"list of integers"
Default:
[
3 2 0
]
Example:
[
1 3 2
]
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix>
|
services.xserver.multitouch.enableWhether to enable multitouch touchpad support.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix>
|
services.xserver.multitouch.ignorePalmWhether to ignore touches detected as being the palm (i.e when typing)
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix>
|
services.xserver.multitouch.invertScrollWhether to invert scrolling direction à la OSX Lion
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix>
|
services.xserver.multitouch.tapButtonsWhether to enable tap buttons.
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix>
|
services.xserver.resolutionsThe screen resolutions for the X server. The first element is the default resolution. If this list is empty, the X server will automatically configure the resolution.
Type:
"list of attribute sets"
Default:
[
]
Example:
[
{
x = 1600; y = 1200;
}
{
x = 1024; y = 786;
}
]
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.screenSectionContents of the first Screen section of the X server configuration file.
Type:
"string"
Default:
""
Example:
'' Option "RandRRotation" "on" ''
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.serverFlagsSectionContents of the ServerFlags section of the X server configuration file.
Type:
"unspecified"
Default:
""
Example:
'' Option "BlankTime" "0" Option "StandbyTime" "0" Option "SuspendTime" "0" Option "OffTime" "0" ''
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.serverLayoutSectionContents of the ServerLayout section of the X server configuration file.
Type:
"string"
Default:
""
Example:
'' Option "AIGLX" "true" ''
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.startGnuPGAgentWhether to start the GnuPG agent when you log in. The GnuPG agent remembers private keys for you so that you don't have to type in passphrases every time you make an SSH connection or sign/encrypt data. Use ssh-add to add a key to the agent.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.synaptics.accelFactorCursor acceleration (how fast speed increases from minSpeed to maxSpeed).
Type:
"null or string"
Default:
"0.001"
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.additionalOptionsAdditional options for synaptics touchpad driver.
Type:
"string"
Default:
""
Example:
'' Option "RTCornerButton" "2" Option "RBCornerButton" "3" ''
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.buttonsMapRemap touchpad buttons.
Type:
"list of integers"
Default:
[
1 2 3
]
Example:
[
1 3 2
]
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.devPath for touchpad device. Set to null to apply to any auto-detected touchpad.
Type:
"null or string"
Default:
null
Example:
"/dev/input/event0"
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.enableWhether to enable touchpad support.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.fingersMapRemap several-fingers taps.
Type:
"list of integers"
Default:
[
1 2 3
]
Example:
[
1 3 2
]
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.horizontalScrollWhether to enable horizontal scrolling (on touchpad)
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.maxSpeedCursor speed factor for highest-speed finger motion.
Type:
"null or string"
Default:
"1.0"
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.minSpeedCursor speed factor for precision finger motion.
Type:
"null or string"
Default:
"0.6"
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.palmDetectWhether to enable palm detection (hardware support required)
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.tapButtonsWhether to enable tap buttons.
Type:
"boolean"
Default:
true
Example:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.twoFingerScrollWhether to enable two-finger drag-scrolling.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.synaptics.vertEdgeScrollWhether to enable vertical edge drag-scrolling.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix>
|
services.xserver.ttyVirtual console for the X server.
Type:
"integer"
Default:
7
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.useGlamorWhether to use the Glamor module for 2D acceleration, if possible.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.useXFSDetermines how to connect to the X Font Server.
Type:
"unspecified"
Default:
false
Example:
"unix/:7100"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.vaapiDriversPackages providing libva acceleration drivers.
Type:
"list of paths"
Default:
[
]
Example:
[ pkgs.vaapiIntel pkgs.vaapiVdpau ]
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.videoDriverThe name of the video driver for your graphics card. This
option is obsolete; please set the
services.xserver.videoDrivers instead.
Type:
"null or string"
Default:
null
Example:
"i810"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.videoDriversThe names of the video drivers the configuration supports. They will be tried in order until one that supports your card is found.
Type:
"list of strings"
Default:
[
"ati" "cirrus" "intel" "vesa" "vmware" "modesetting"
]
Example:
[
"vesa"
]
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.virtualScreenVirtual screen size for Xrandr.
Type:
"null or attribute set"
Default:
null
Example:
{
x = 2048; y = 2048;
}
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.wacom.enableWhether to enable the Wacom touchscreen/digitizer/tablet.
If you ever have any issues such as, try switching to terminal (ctrl-alt-F1) and back
which will make Xorg reconfigure the device ?
If you're not satisfied by the default behaviour you can override
environment.etc."X11/xorg.conf.d/50-wacom.conf" in
configuration.nix easily.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/hardware/wacom.nix>
|
services.xserver.windowManager.afterstep.enableEnable the Afterstep window manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/afterstep.nix>
|
services.xserver.windowManager.awesome.enableWhether to enable Awesome window manager.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/awesome.nix>
|
services.xserver.windowManager.awesome.luaModulesList of lua packages available for being used in the Awesome configuration.
Type:
"list of derivations"
Default:
[
]
Example:
[ luaPackages.oocairo ]
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/awesome.nix>
|
services.xserver.windowManager.awesome.packagePackage to use for running the Awesome WM.
Type:
"null or derivation"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/awesome.nix>
|
services.xserver.windowManager.bspwm.enableEnable the bspwm window manager.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/bspwm.nix>
|
services.xserver.windowManager.compiz.enableEnable the Compiz window manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/compiz.nix>
|
services.xserver.windowManager.compiz.renderingFlagPass the --indirect-rendering flag to Compiz.
Type:
"unspecified"
Default:
""
Example:
"--indirect-rendering"
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/compiz.nix>
|
services.xserver.windowManager.defaultDefault window manager loaded if none have been chosen.
Type:
"string"
Default:
"none"
Example:
"wmii"
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/default.nix>
|
services.xserver.windowManager.fluxbox.enableEnable the Fluxbox window manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/fluxbox.nix>
|
services.xserver.windowManager.herbstluftwm.enableEnable the herbstluftwm window manager.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/herbstluftwm.nix>
|
services.xserver.windowManager.i3.configFilePath to the i3 configuration file. If left at the default value, $HOME/.i3/config will be used.
Type:
"null or path"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/i3.nix>
|
services.xserver.windowManager.i3.enableEnable the i3 tiling window manager.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/i3.nix>
|
services.xserver.windowManager.icewm.enableEnable the IceWM window manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/icewm.nix>
|
services.xserver.windowManager.metacity.enableEnable the metacity window manager.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/metacity.nix>
|
services.xserver.windowManager.openbox.enableEnable the Openbox window manager.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/openbox.nix>
|
services.xserver.windowManager.ratpoison.enableEnable the Ratpoison window manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/ratpoison.nix>
|
services.xserver.windowManager.sawfish.enableEnable the Sawfish window manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/sawfish.nix>
|
services.xserver.windowManager.spectrwm.enableEnable the spectrwm window manager.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/spectrwm.nix>
|
services.xserver.windowManager.stumpwm.enableEnable the stumpwm tiling window manager.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/stumpwm.nix>
|
services.xserver.windowManager.twm.enableEnable the twm window manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/twm.nix>
|
services.xserver.windowManager.windowmaker.enableEnable the Windowmaker window manager.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/windowmaker.nix>
|
services.xserver.windowManager.wmii.enableEnable the wmii window manager.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/wmii.nix>
|
services.xserver.windowManager.xmonad.enableEnable the xmonad window manager.
Type:
"unspecified"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/xmonad.nix>
|
services.xserver.windowManager.xmonad.enableContribAndExtrasEnable xmonad-{contrib,extras} in Xmonad.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/xmonad.nix>
|
services.xserver.windowManager.xmonad.extraPackagesExtra packages available to ghc when rebuilding Xmonad. The
value must be a function which receives the attrset defined
in haskellPackages as the sole argument.
Type:
"unspecified"
Default:
"<function>"
Example:
haskellPackages: [ haskellPackages.xmonad-contrib haskellPackages.monad-logger ]
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/xmonad.nix>
|
services.xserver.windowManager.xmonad.haskellPackageshaskellPackages used to build Xmonad and other packages.
This can be used to change the GHC version used to build
Xmonad and the packages listed in
extraPackages.
Type:
"unspecified"
Default:
"pkgs.haskellngPackages"
Example:
pkgs.haskell-ng.packages.ghc784
Declared by:
<nixpkgs/nixos/modules/services/x11/window-managers/xmonad.nix>
|
services.xserver.xkbModelKeyboard model.
Type:
"string"
Default:
"pc104"
Example:
"presario"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.xkbOptionsX keyboard options; layout switching goes here.
Type:
"string"
Default:
"terminate:ctrl_alt_bksp"
Example:
"grp:caps_toggle, grp_led:scroll"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.xkbVariantX keyboard variant.
Type:
"string"
Default:
""
Example:
"colemak"
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.xserver.xrandrHeadsSimple multiple monitor configuration, just specify a list of XRandR outputs which will be mapped from left to right in the order of the list. Be careful using this option with multiple graphic adapters or with drivers that have poor support for XRandR, unexpected things might happen with those.
Type:
"list of strings"
Default:
[
]
Example:
[
"HDMI-0" "DVI-0"
]
Declared by:
<nixpkgs/nixos/modules/services/x11/xserver.nix>
|
services.yandex-disk.directoryThe directory to use for Yandex.Disk storage
Type:
"unspecified"
Default:
"/home/Yandex.Disk"
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix>
|
services.yandex-disk.enableWhether to enable Yandex-disk client. See https://disk.yandex.ru/
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix>
|
services.yandex-disk.passwordYour yandex.com password. Warning: it will be world-readable in /nix/store.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix>
|
services.yandex-disk.userThe user the yandex-disk daemon should run as.
Type:
"unspecified"
Default:
null
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix>
|
services.yandex-disk.usernameYour yandex.com login name.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix>
|
services.zabbixAgent.enableWhether to run the Zabbix monitoring agent on this machine. It will send monitoring data to a Zabbix server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix>
|
services.zabbixAgent.extraConfigConfiguration that is injected verbatim into the configuration file.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix>
|
services.zabbixAgent.serverThe IP address or hostname of the Zabbix server to connect to.
Type:
"unspecified"
Default:
"127.0.0.1"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix>
|
services.zabbixServer.dbPasswordPassword used to connect to the database server.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/zabbix-server.nix>
|
services.zabbixServer.dbServerHostname or IP address of the database server. Use an empty string ("") to use peer authentication.
Type:
"string"
Default:
"localhost"
Declared by:
<nixpkgs/nixos/modules/services/monitoring/zabbix-server.nix>
|
services.zabbixServer.enableWhether to run the Zabbix server on this machine.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/monitoring/zabbix-server.nix>
|
services.zabbixServer.extraConfigConfiguration that is injected verbatim into the configuration file.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/monitoring/zabbix-server.nix>
|
services.zfs.autoSnapshot.dailyNumber of daily auto-snapshots that you wish to keep.
Type:
"integer"
Default:
7
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
services.zfs.autoSnapshot.enableEnable the (OpenSolaris-compatible) ZFS auto-snapshotting service.
Note that you must set the com.sun:auto-snapshot
property to true on all datasets which you wish
to auto-snapshot.
You can override a child dataset to use, or not use auto-snapshotting
by setting its flag with the given interval:
zfs set com.sun:auto-snapshot:weekly=false DATASET
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
services.zfs.autoSnapshot.frequentNumber of frequent (15-minute) auto-snapshots that you wish to keep.
Type:
"integer"
Default:
4
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
services.zfs.autoSnapshot.hourlyNumber of hourly auto-snapshots that you wish to keep.
Type:
"integer"
Default:
24
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
services.zfs.autoSnapshot.monthlyNumber of monthly auto-snapshots that you wish to keep.
Type:
"integer"
Default:
12
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
services.zfs.autoSnapshot.weeklyNumber of weekly auto-snapshots that you wish to keep.
Type:
"integer"
Default:
4
Declared by:
<nixpkgs/nixos/modules/tasks/filesystems/zfs.nix>
|
services.znc.confOptions.extraZncConfExtra config to `znc.conf` file
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.confOptions.modulesA list of modules to include in the `znc.conf` file.
Type:
"list of strings"
Default:
[
"partyline" "webadmin" "adminlog" "log"
]
Example:
[
"partyline" "webadmin" "adminlog" "log"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.confOptions.nickThe IRC nick to use when generating the `znc.conf` file.
Type:
"string"
Default:
"znc-user"
Example:
"john"
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.confOptions.passBlockThe pass block to use when generating the `znc.conf` file. This is the password used by the user logging into the ZNC web admin. This is the block generated by the `znc --makepass` command. !!! If not specified, please change this after starting the service. !!!
Type:
"string"
Default:
''
<Pass password>
Method = sha256
Hash = e2ce303c7ea75c571d80d8540a8699b46535be6a085be3414947d638e48d9e93
Salt = l5Xryew4g*!oa(ECfX2o
</Pass>
''Example:
"Must be the block generated by the `znc --makepass` command."
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.confOptions.portSpecifies the port on which to listen.
Type:
"integer"
Default:
5000
Example:
5000
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.confOptions.useSSLIndicates whether the ZNC server should use SSL when listening on the specified port.
Type:
"boolean"
Default:
true
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.confOptions.userModulesA list of user modules to include in the `znc.conf` file.
Type:
"list of strings"
Default:
[
]
Example:
[
"fish" "push"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.confOptions.userNameThe user name to use when generating the `znc.conf` file. This is the user name used by the user logging into the ZNC web admin.
Type:
"string"
Default:
"znc"
Example:
"johntron"
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.dataDirThe data directory. Used for configuration files and modules.
Type:
"path"
Default:
"/var/lib/znc/"
Example:
"/home/john/.znc/"
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.enableEnable a ZNC service for a user.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.extraFlagsExtra flags to use when executing znc command.
Type:
"list of strings"
Default:
[
]
Example:
[
"--debug"
]
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.modulePackagesA list of global znc module packages to add to znc.
Type:
"list of derivations"
Default:
[
]
Example:
[ pkgs.zncModules.fish pkgs.zncModules.push ]
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.mutableIndicates whether to allow the contents of the `dataDir` directory to be changed by the user at run-time. If true, modifications to the ZNC configuration after its initial creation are not overwritten by a NixOS system rebuild. If false, the ZNC configuration is rebuilt by every system rebuild. If the user wants to manage the ZNC service using the web admin interface, this value should be set to true.
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.userThe name of an existing user account to use to own the ZNC server process. If not specified, a default user will be created to own the process.
Type:
"string"
Default:
"znc"
Example:
"john"
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.znc.zncConfThe contents of the `znc.conf` file to use when creating it. If specified, `confOptions` will be ignored, and this value, as-is, will be used. If left empty, a conf file with default values will be used. Recommended to generate with `znc --makeconf` command.
Type:
"string"
Default:
""
Example:
"See: http://wiki.znc.in/Configuration"
Declared by:
<nixpkgs/nixos/modules/services/networking/znc.nix>
|
services.zookeeper.dataDirData directory for Zookeeper
Type:
"path"
Default:
"/var/lib/zookeeper"
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.enableWhether to enable Zookeeper.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.extraCmdLineOptionsExtra command line options for the Zookeeper launcher.
Type:
"list of strings"
Default:
[
"-Dcom.sun.management.jmxremote" "-Dcom.sun.management.jmxremote.local.only=true"
]
Example:
[
"-Djava.net.preferIPv4Stack=true" "-Dcom.sun.management.jmxremote" "-Dcom.sun.management.jmxremote.local.only=true"
]
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.extraConfExtra configuration for Zookeeper.
Type:
"string"
Default:
'' initLimit=5 syncLimit=2 tickTime=2000 ''
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.idZookeeper ID.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.loggingZookeeper logging configuration.
Type:
"string"
Default:
''
zookeeper.root.logger=INFO, CONSOLE
log4j.rootLogger=INFO, CONSOLE
log4j.appender.CONSOLE=org.apache.log4j.ConsoleAppender
log4j.appender.CONSOLE.layout=org.apache.log4j.PatternLayout
log4j.appender.CONSOLE.layout.ConversionPattern=[myid:%X{myid}] - %-5p [%t:%C{1}@%L] - %m%n
''Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.portZookeeper Client port.
Type:
"integer"
Default:
2181
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.preferIPv4Add the -Djava.net.preferIPv4Stack=true flag to the Zookeeper server.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.purgeIntervalThe time interval in hours for which the purge task has to be triggered. Set to a positive integer (1 and above) to enable the auto purging.
Type:
"integer"
Default:
1
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zookeeper.serversAll Zookeeper Servers.
Type:
"string"
Default:
""
Example:
'' server.0=host0:2888:3888 server.1=host1:2888:3888 server.2=host2:2888:3888 ''
Declared by:
<nixpkgs/nixos/modules/services/misc/zookeeper.nix>
|
services.zope2.instanceszope2 instances to be created automaticaly by the system.
Type:
"list or attribute set of submodules"
Default:
{
}
Example:
{
plone01 =
{
extra = "<zodb_db main>\n mount-point /\n cache-size 30000\n <blobstorage>\n blob-dir /var/lib/zope2/plone01/blobstorage\n <filestorage>\n path /var/lib/zope2/plone01/filestorage/Data.fs\n </filestorage>\n </blobstorage>\n</zodb_db>\n"; http_address = "127.0.0.1:8080";
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/web-servers/zope2.nix>
|
services.zope2.instances.<name?>.clientHomeHome directory of zope2 instance.
Type:
"string"
Default:
"/var/lib/zope2/"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/zope2.nix>
|
services.zope2.instances.<name?>.extraExtra zope.conf
Type:
"string"
Default:
''
<zodb_db main>
mount-point /
cache-size 30000
<blobstorage>
blob-dir /var/lib/zope2//blobstorage
<filestorage>
path /var/lib/zope2//filestorage/Data.fs
</filestorage>
</blobstorage>
</zodb_db>
''Declared by:
<nixpkgs/nixos/modules/services/web-servers/zope2.nix>
|
services.zope2.instances.<name?>.http_addressGive a port and address for the HTTP server.
Type:
"string"
Default:
"localhost:8080"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/zope2.nix>
|
services.zope2.instances.<name?>.nameThe name of the zope2 instance. If undefined, the name of the attribute set will be used.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/services/web-servers/zope2.nix>
|
services.zope2.instances.<name?>.packagesThe list of packages you want to make available to the zope2 instance.
Type:
"list of derivations"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/zope2.nix>
|
services.zope2.instances.<name?>.threadsSpecify the number of threads that Zope's ZServer web server will use to service requests.
Type:
"integer"
Default:
2
Declared by:
<nixpkgs/nixos/modules/services/web-servers/zope2.nix>
|
services.zope2.instances.<name?>.userThe name of the effective user for the Zope process.
Type:
"string"
Default:
"zope2"
Declared by:
<nixpkgs/nixos/modules/services/web-servers/zope2.nix>
|
sound.enableWhether to enable ALSA sound.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/audio/alsa.nix>
|
sound.enableOSSEmulationWhether to enable ALSA OSS emulation (with certain cards sound mixing may not work!).
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/services/audio/alsa.nix>
|
sound.extraConfigSet addition configuration for system-wide alsa.
Type:
"string"
Default:
""
Example:
'' defaults.pcm.!card 3 ''
Declared by:
<nixpkgs/nixos/modules/services/audio/alsa.nix>
|
swapDevicesThe swap devices and swap files. These must have been
initialised using mkswap. Each element
should be an attribute set specifying either the path of the
swap device or file (device) or the label
of the swap device (label, see
mkswap -L). Using a label is
recommended.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
device = "/dev/hda7";
}
{
device = "/var/swapfile";
}
{
label = "bigswap";
}
]
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
<nixpkgs/nixos/modules/config/swap.nix>
|
swapDevices.*.devicePath of the device.
Type:
"string"
Example:
"/dev/sda3"
Declared by:
<nixpkgs/nixos/modules/config/swap.nix>
|
swapDevices.*.encrypted.blkDevLocation of the backing encrypted device.
Type:
"null or string"
Default:
null
Example:
"/dev/sda1"
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
swapDevices.*.encrypted.enableThe block device is backed by an encrypted one, adds this device as a initrd luks entry.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
swapDevices.*.encrypted.keyFileFile system location of keyfile.
Type:
"null or string"
Default:
null
Example:
"/root/.swapkey"
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
swapDevices.*.encrypted.labelLabel of the backing encrypted device.
Type:
"null or string"
Default:
null
Example:
"rootfs"
Declared by:
<nixpkgs/nixos/modules/tasks/encrypted-devices.nix>
|
swapDevices.*.labelLabel of the device. Can be used instead of device.
Type:
"string"
Example:
"swap"
Declared by:
<nixpkgs/nixos/modules/config/swap.nix>
|
swapDevices.*.prioritySpecify the priority of the swap device. Priority is a value between 0 and 32767. Higher numbers indicate higher priority. null lets the kernel choose a priority, which will show up as a negative value.
Type:
"null or integer"
Default:
null
Example:
2048
Declared by:
<nixpkgs/nixos/modules/config/swap.nix>
|
swapDevices.*.sizeIf this option is set, ‘device’ is interpreted as the path of a swapfile that will be created automatically with the indicated size (in megabytes) if it doesn't exist.
Type:
"null or integer"
Default:
null
Example:
2048
Declared by:
<nixpkgs/nixos/modules/config/swap.nix>
|
system.activationScriptsA set of shell script fragments that are executed when a NixOS system configuration is activated. Examples are updating /etc, creating accounts, and so on. Since these are executed every time you boot the system or run nixos-rebuild, it's important that they are idempotent and fast.
Type:
"attribute set of unspecifieds"
Default:
{
}
Example:
{
stdio =
{
deps =
[
]
; text = "# Needed by some programs.\nln -sfn /proc/self/fd /dev/fd\nln -sfn /proc/self/fd/0 /dev/stdin\nln -sfn /proc/self/fd/1 /dev/stdout\nln -sfn /proc/self/fd/2 /dev/stderr\n";
}
;
}
Declared by:
<nixpkgs/nixos/modules/system/activation/activation-script.nix>
|
system.copySystemConfigurationIf enabled, copies the NixOS configuration file
$NIXOS_CONFIG (usually
/etc/nixos/configuration.nix)
to the system store path.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/activation/top-level.nix>
|
system.replaceRuntimeDependenciesList of packages to override without doing a full rebuild. The original derivation and replacement derivation must have the same name length, and ideally should have close-to-identical directory layout.
Type:
"list of submodules"
Default:
[
]
Example:
[ ({ original = pkgs.openssl; replacement = pkgs.callPackage /path/to/openssl { ... }; }) ]Declared by:
<nixpkgs/nixos/modules/system/activation/top-level.nix>
|
systemd.additionalUpstreamSystemUnitsAdditional units shipped with systemd that shall be enabled.
Type:
"list of strings"
Default:
[
]
Example:
[
"debug-shell.service" "systemd-quotacheck.service"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automountsDefinition of systemd automount units. This is a list instead of an attrSet, because systemd mandates the names to be derived from the 'where' attribute.
Type:
"list of submodules"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.automountConfigEach attribute in this set specifies an option in the
[Automount] section of the unit. See
systemd.automount(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
DirectoryMode = "0775";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.automounts.*.whereAbsolute path of a directory of the mount point. Will be created if it doesn't exist. (Mandatory)
Type:
"string"
Example:
"/mnt"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.defaultUnitDefault unit started when the system boots.
Type:
"string"
Default:
"multi-user.target"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.enableEmergencyModeWhether to enable emergency mode, which is an sulogin shell started on the console if mounting a filesystem fails. Since some machines (like EC2 instances) have no console of any kind, emergency mode doesn't make sense, and it's better to continue with the boot insofar as possible.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/emergency-mode.nix>
|
systemd.extraConfigExtra config options for systemd. See man systemd-system.conf for available options.
Type:
"string"
Default:
""
Example:
"DefaultLimitCORE=infinity"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.globalEnvironmentEnvironment variables passed to all systemd units.
Type:
"attribute set"
Default:
{
}
Example:
{
TZ = "CET";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mountsDefinition of systemd mount units. This is a list instead of an attrSet, because systemd mandates the names to be derived from the 'where' attribute.
Type:
"list of submodules"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.mountConfigEach attribute in this set specifies an option in the
[Mount] section of the unit. See
systemd.mount(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
DirectoryMode = "0775";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.optionsOptions used to mount the file system.
Type:
"string"
Default:
""
Example:
"noatime"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.typeFile system type.
Type:
"string"
Default:
""
Example:
"ext4"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.whatAbsolute path of device node, file or other resource. (Mandatory)
Type:
"string"
Example:
"/dev/sda1"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.mounts.*.whereAbsolute path of a directory of the mount point. Will be created if it doesn't exist. (Mandatory)
Type:
"string"
Example:
"/mnt"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.enableWhether to enable networkd or not.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.linksDefinition of systemd network links.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.links.<name>.enableIf set to false, this unit will be a symlink to /dev/null.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.links.<name>.linkConfigEach attribute in this set specifies an option in the
[Link] section of the unit. See
systemd.link(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
MACAddress = "00:ff:ee:aa:cc:dd";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.links.<name>.matchConfigEach attribute in this set specifies an option in the
[Match] section of the unit. See
systemd.link(5)
systemd.netdev(5)
systemd.network(5)
for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Name = "eth0";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevsDefinition of systemd network devices.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.bondConfigEach attribute in this set specifies an option in the
[Bond] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Mode = "802.3ad";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.enableIf set to false, this unit will be a symlink to /dev/null.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.macvlanConfigEach attribute in this set specifies an option in the
[MACVLAN] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Mode = "private";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.matchConfigEach attribute in this set specifies an option in the
[Match] section of the unit. See
systemd.link(5)
systemd.netdev(5)
systemd.network(5)
for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Name = "eth0";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.netdevConfigEach attribute in this set specifies an option in the
[Netdev] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Kind = "bridge"; Name = "mybridge";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.peerConfigEach attribute in this set specifies an option in the
[Peer] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Name = "veth2";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.tapConfigEach attribute in this set specifies an option in the
[Tap] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
User = "openvpn";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.tunConfigEach attribute in this set specifies an option in the
[Tun] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
User = "openvpn";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.tunnelConfigEach attribute in this set specifies an option in the
[Tunnel] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Remote = "192.168.1.1";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.vlanConfigEach attribute in this set specifies an option in the
[VLAN] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Id = "4";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.netdevs.<name>.vxlanConfigEach attribute in this set specifies an option in the
[VXLAN] section of the unit. See
systemd.netdev(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Id = "4";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networksDefinition of systemd networks.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.DHCPWhether to enable DHCP on the interfaces matched.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.addressA list of addresses to be added to the network section of the unit. See systemd.network(5) for details.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.addressesA list of address sections to be added to the unit. See systemd.network(5) for details.
Type:
"list of submodules"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.addresses.*.addressConfigEach attribute in this set specifies an option in the
[Address] section of the unit. See
systemd.network(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Address = "192.168.0.100/24";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.dhcpConfigEach attribute in this set specifies an option in the
[DHCP] section of the unit. See
systemd.network(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
UseDNS = true; UseRoutes = true;
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.dnsA list of dns servers to be added to the network section of the unit. See systemd.network(5) for details.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.domainsA list of domains to pass to the network config.
Type:
"null or list of strings"
Default:
null
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.enableIf set to false, this unit will be a symlink to /dev/null.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.gatewayA list of gateways to be added to the network section of the unit. See systemd.network(5) for details.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.macvlanA list of macvlan interfaces to be added to the network section of the unit. See systemd.network(5) for details.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.matchConfigEach attribute in this set specifies an option in the
[Match] section of the unit. See
systemd.link(5)
systemd.netdev(5)
systemd.network(5)
for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Name = "eth0";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.nameThe name of the network interface to match against.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.networkConfigEach attribute in this set specifies an option in the
[Network] section of the unit. See
systemd.network(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Description = "My Network";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.ntpA list of ntp servers to be added to the network section of the unit. See systemd.network(5) for details.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.routesA list of route sections to be added to the unit. See systemd.network(5) for details.
Type:
"list of submodules"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.routes.*.routeConfigEach attribute in this set specifies an option in the
[Route] section of the unit. See
systemd.network(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
Gateway = "192.168.0.1";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.tunnelA list of tunnel interfaces to be added to the network section of the unit. See systemd.network(5) for details.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.vlanA list of vlan interfaces to be added to the network section of the unit. See systemd.network(5) for details.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.networks.<name>.vxlanA list of vxlan interfaces to be added to the network section of the unit. See systemd.network(5) for details.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.unitsDefinition of networkd units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.units.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.units.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.units.<name>.textText of this systemd unit.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.network.units.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.packagesPackages providing systemd units.
Type:
"list of derivations"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.pathsDefinition of systemd path units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.pathConfigEach attribute in this set specifies an option in the
[Path] section of the unit. See
systemd.path(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
PathChanged = "/some/path"; Unit = "changedpath.service";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.paths.<name>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.servicesDefinition of systemd service units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/testing/service-runner.nix>
|
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.environmentEnvironment variables passed to the service's processes.
Type:
"attribute set"
Default:
{
}
Example:
{
LANG = "nl_NL.UTF-8"; PATH = "/foo/bar/bin";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.pathPackages added to the service's PATH
environment variable. Both the bin
and sbin subdirectories of each
package are added.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.postStartShell commands executed after the service's main process is started.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.postStopShell commands executed after the service's main process has exited.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.preStartShell commands executed before the service's main process is started.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.preStopShell commands executed to stop the service.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.reloadShell commands executed when the service's main process is reloaded.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.reloadIfChangedWhether the service should be reloaded during a NixOS
configuration switch if its definition has changed. If
enabled, the value of restartIfChanged is
ignored.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.restartIfChangedWhether the service should be restarted during a NixOS configuration switch if its definition has changed.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.scriptShell commands executed as the service's main process.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.scriptArgsArguments passed to the main process script.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.serviceConfigEach attribute in this set specifies an option in the
[Service] section of the unit. See
systemd.service(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RestartSec = 5; StartLimitInterval = 10;
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.startAtAutomatically start this unit at the given date/time, which
must be in the format described in
systemd.time(5). This is equivalent
to adding a corresponding timer unit with
OnCalendar set to the value given here.
Type:
"string"
Default:
""
Example:
"Sun 14:00:00"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.stopIfChangedIf set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one.
Otherwise, it is restarted in a single step using
systemctl restart in the new configuration.
The latter is less correct because it runs the
ExecStop commands from the new
configuration.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.services.<name>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.socketsDefinition of systemd socket units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.listenStreamsFor each item in this list, a ListenStream
option in the [Socket] section will be created.
Type:
"list of strings"
Default:
[
]
Example:
[
"0.0.0.0:993" "/run/my-socket"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.socketConfigEach attribute in this set specifies an option in the
[Socket] section of the unit. See
systemd.socket(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
ListenStream = "/run/my-socket";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.sockets.<name>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targetsDefinition of systemd target units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.targets.<name>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timersDefinition of systemd timer units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.timerConfigEach attribute in this set specifies an option in the
[Timer] section of the unit. See
systemd.timer(5) and
systemd.time(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
OnCalendar = "Sun 14:00:00"; Unit = "foo.service";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.timers.<name>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.tmpfiles.rulesRules for creating and cleaning up temporary files automatically. See tmpfiles.d(5) for the exact format. You should not use this option to create files required by systemd services, since there is no guarantee that systemd-tmpfiles runs when the system is reconfigured using nixos-rebuild.
Type:
"list of strings"
Default:
[
]
Example:
[
"d /tmp 1777 root root 10d"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.unitsDefinition of systemd units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.units.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.units.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.units.<name>.textText of this systemd unit.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.units.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.servicesDefinition of systemd per-user service units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.environmentEnvironment variables passed to the service's processes.
Type:
"attribute set"
Default:
{
}
Example:
{
LANG = "nl_NL.UTF-8"; PATH = "/foo/bar/bin";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.pathPackages added to the service's PATH
environment variable. Both the bin
and sbin subdirectories of each
package are added.
Type:
"unspecified"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.postStartShell commands executed after the service's main process is started.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.postStopShell commands executed after the service's main process has exited.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.preStartShell commands executed before the service's main process is started.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.preStopShell commands executed to stop the service.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.reloadShell commands executed when the service's main process is reloaded.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.reloadIfChangedWhether the service should be reloaded during a NixOS
configuration switch if its definition has changed. If
enabled, the value of restartIfChanged is
ignored.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.restartIfChangedWhether the service should be restarted during a NixOS configuration switch if its definition has changed.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.scriptShell commands executed as the service's main process.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.scriptArgsArguments passed to the main process script.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.serviceConfigEach attribute in this set specifies an option in the
[Service] section of the unit. See
systemd.service(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RestartSec = 5; StartLimitInterval = 10;
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.startAtAutomatically start this unit at the given date/time, which
must be in the format described in
systemd.time(5). This is equivalent
to adding a corresponding timer unit with
OnCalendar set to the value given here.
Type:
"string"
Default:
""
Example:
"Sun 14:00:00"
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.stopIfChangedIf set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one.
Otherwise, it is restarted in a single step using
systemctl restart in the new configuration.
The latter is less correct because it runs the
ExecStop commands from the new
configuration.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.services.<name>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.socketsDefinition of systemd per-user socket units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.listenStreamsFor each item in this list, a ListenStream
option in the [Socket] section will be created.
Type:
"list of strings"
Default:
[
]
Example:
[
"0.0.0.0:993" "/run/my-socket"
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.socketConfigEach attribute in this set specifies an option in the
[Socket] section of the unit. See
systemd.socket(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
ListenStream = "/run/my-socket";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.sockets.<name>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timersDefinition of systemd per-user timer units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.afterIf the specified units are started at the same time as this unit, delay this unit until they have started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.beforeIf the specified units are started at the same time as this unit, delay them until this unit has started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.bindsToLike ‘requires’, but in addition, if the specified units unexpectedly disappear, this unit will be stopped as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.conflictsIf the specified units are started, then this unit is stopped and vice versa.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.descriptionDescription of this unit used in systemd messages and progress indicators.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.partOfIf the specified units are stopped or restarted, then this unit is stopped or restarted as well.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.requiresStart the specified units when this unit is started, and stop this unit when the specified units are stopped or fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.requisiteSimilar to requires. However if the units listed are not started, they will not be started and the transaction will fail.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.restartTriggersAn arbitrary list of items such as derivations. If any item in the list changes between reconfigurations, the service will be restarted.
Type:
"list of unspecifieds"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.timerConfigEach attribute in this set specifies an option in the
[Timer] section of the unit. See
systemd.timer(5) and
systemd.time(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
OnCalendar = "Sun 14:00:00"; Unit = "foo.service";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.unitConfigEach attribute in this set specifies an option in the
[Unit] section of the unit. See
systemd.unit(5) for details.
Type:
"attribute set of systemd options"
Default:
{
}
Example:
{
RequiresMountsFor = "/data";
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.timers.<name>.wantsStart the specified units when this unit is started.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.unitsDefinition of systemd per-user units.
Type:
"attribute set of submodules"
Default:
{
}
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.units.<name>.enableIf set to false, this unit will be a symlink to
/dev/null. This is primarily useful to prevent specific
template instances (e.g. serial-getty@ttyS0)
from being started.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.units.<name>.requiredByUnits that require (i.e. depend on and need to go down with) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.units.<name>.textText of this systemd unit.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
systemd.user.units.<name>.wantedByUnits that want (i.e. depend on) this unit.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/system/boot/systemd.nix>
|
time.hardwareClockInLocalTimeIf set, keep the hardware clock in local time instead of UTC.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/timezone.nix>
|
time.timeZoneThe time zone used when displaying times and dates. See https://en.wikipedia.org/wiki/List_of_tz_database_time_zones for a comprehensive list of possible values for this setting.
Type:
"string"
Default:
"UTC"
Example:
"America/New_York"
Declared by:
<nixpkgs/nixos/modules/config/timezone.nix>
|
uim.enableEnable UIM input method
Type:
"boolean"
Default:
false
Example:
true
Declared by:
<nixpkgs/nixos/modules/programs/uim.nix>
|
users.defaultUserShellThis option defines the default shell assigned to user accounts. This must not be a store path, since the path is used outside the store (in particular in /etc/passwd). Rather, it should be the path of a symlink that points to the actual shell in the Nix store.
Type:
"path"
Example:
"/run/current-system/sw/bin/zsh"
Declared by:
<nixpkgs/nixos/modules/programs/shadow.nix>
|
users.enforceIdUniquenessWhether to require that no two users/groups share the same uid/gid.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraGroupsAdditional groups to be created automatically by the system.
Type:
"list or attribute set of submodules"
Default:
{
}
Example:
{
hackers =
{
}
; students =
{
gid = 1001;
}
;
}
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraGroups.<name?>.gidThe group GID. If the GID is null, a free GID is picked on activation.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraGroups.<name?>.membersThe user names of the group members, added to the
/etc/group file.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraGroups.<name?>.nameThe name of the group. If undefined, the name of the attribute set will be used.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsersAdditional user accounts to be created automatically by the system. This can also be used to set options for root.
Type:
"list or attribute set of submodules"
Default:
{
}
Example:
{
alice =
{
createHome = true; description = "Alice Q. User"; extraGroups =
[
"wheel"
]
; group = "users"; home = "/home/alice"; shell = "/bin/sh"; uid = 1234;
}
;
}
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.createHomeIf true, the home directory will be created automatically. If this option is true and the home directory already exists but is not owned by the user, directory owner and group will be changed to match the user.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.descriptionA short description of the user account, typically the
user's full name. This is actually the “GECOS” or “comment”
field in /etc/passwd.
Type:
"string"
Default:
""
Example:
"Alice Q. User"
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.extraGroupsThe user's auxiliary groups.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.groupThe user's primary group.
Type:
"string"
Default:
"nogroup"
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.hashedPasswordSpecifies the hashed password for the user.
The options hashedPassword,
password and passwordFile
controls what password is set for the user.
hashedPassword overrides both
password and passwordFile.
password overrides passwordFile.
If none of these three options are set, no password is assigned to
the user, and the user will not be able to do password logins.
If the option users.mutableUsers is true, the
password defined in one of the three options will only be set when
the user is created for the first time. After that, you are free to
change the password with the ordinary user management commands. If
users.mutableUsers is false, you cannot change
user passwords, they will always be set according to the password
options.
To generate hashed password install mkpassword
package and run mkpasswd -m sha-512.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.homeThe user's home directory.
Type:
"string"
Default:
"/var/empty"
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.initialHashedPasswordSpecifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist. If users.mutableUsers is true, the
password can be changed subsequently using the
passwd command. Otherwise, it's
equivalent to setting the password option.
To generate hashed password install mkpassword
package and run mkpasswd -m sha-512.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.initialPasswordSpecifies the initial password for the user, i.e. the
password assigned if the user does not already exist. If
users.mutableUsers is true, the password
can be changed subsequently using the
passwd command. Otherwise, it's
equivalent to setting the password
option. The same caveat applies: the password specified here
is world-readable in the Nix store, so it should only be
used for guest accounts or passwords that will be changed
promptly.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.isNormalUserIndicates whether this is an account for a “real” user. This
automatically sets group to
users, createHome to
true, home to
/home/,
usernameuseDefaultShell to true,
and isSystemUser to
false.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.isSystemUserIndicates if the user is a system user or not. This option
only has an effect if uid is
null, in which case it determines whether
the user's UID is allocated in the range for system users
(below 500) or in the range for normal users (starting at
1000).
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.nameThe name of the user account. If undefined, the name of the attribute set will be used.
Type:
"string"
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.openssh.authorizedKeys.keyFilesA list of files each containing one OpenSSH public key that should be
added to the user's authorized keys. The contents of the files are
read at build time and added to a file that the SSH daemon reads in
addition to the the user's authorized_keys file. You can combine the
keyFiles and keys options.
Type:
"list of paths"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
users.extraUsers.<name?>.openssh.authorizedKeys.keysA list of verbatim OpenSSH public keys that should be added to the
user's authorized keys. The keys are added to a file that the SSH
daemon reads in addition to the the user's authorized_keys file.
You can combine the keys and
keyFiles options.
Type:
"list of strings"
Default:
[
]
Declared by:
<nixpkgs/nixos/modules/services/networking/ssh/sshd.nix>
|
users.extraUsers.<name?>.passwordSpecifies the (clear text) password for the user.
Warning: do not set confidential information here
because it is world-readable in the Nix store. This option
should only be used for public accounts.
The options hashedPassword,
password and passwordFile
controls what password is set for the user.
hashedPassword overrides both
password and passwordFile.
password overrides passwordFile.
If none of these three options are set, no password is assigned to
the user, and the user will not be able to do password logins.
If the option users.mutableUsers is true, the
password defined in one of the three options will only be set when
the user is created for the first time. After that, you are free to
change the password with the ordinary user management commands. If
users.mutableUsers is false, you cannot change
user passwords, they will always be set according to the password
options.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.passwordFileThe full path to a file that contains the user's password. The password
file is read on each system activation. The file should contain
exactly one line, which should be the password in an encrypted form
that is suitable for the chpasswd -e command.
The options hashedPassword,
password and passwordFile
controls what password is set for the user.
hashedPassword overrides both
password and passwordFile.
password overrides passwordFile.
If none of these three options are set, no password is assigned to
the user, and the user will not be able to do password logins.
If the option users.mutableUsers is true, the
password defined in one of the three options will only be set when
the user is created for the first time. After that, you are free to
change the password with the ordinary user management commands. If
users.mutableUsers is false, you cannot change
user passwords, they will always be set according to the password
options.
Type:
"null or string"
Default:
null
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.shellThe path to the user's shell.
Type:
"string"
Default:
"/run/current-system/sw/bin/nologin"
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.subGidRangesSubordinate group ids that user is allowed to use.
They are set into /etc/subgid and are used
by newgidmap for user namespaces.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
count = 1; startGid = 100;
}
{
count = 999; startGid = 1001;
}
]
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.subGidRanges.*.countCount of subordinate group ids
Type:
"integer"
Default:
1
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.subGidRanges.*.startGidStart of the range of subordinate group ids that user is allowed to use.
Type:
"integer"
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.subUidRangesSubordinate user ids that user is allowed to use.
They are set into /etc/subuid and are used
by newuidmap for user namespaces.
Type:
"list of submodules"
Default:
[
]
Example:
[
{
count = 1; startUid = 1000;
}
{
count = 65534; startUid = 100001;
}
]
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.subUidRanges.*.countCount of subordinate user ids
Type:
"integer"
Default:
1
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.subUidRanges.*.startUidStart of the range of subordinate user ids that user is allowed to use.
Type:
"integer"
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.uidThe account UID. If the UID is null, a free UID is picked on activation.
Type:
"null or integer"
Default:
null
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.extraUsers.<name?>.useDefaultShellIf true, the user's shell will be set to
users.defaultUserShell.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
users.ldap.baseThe distinguished name of the search base.
Type:
"unspecified"
Example:
"dc=example,dc=org"
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.bind.distinguishedNameThe distinguished name to bind to the LDAP server with. If this is not specified, an anonymous bind will be done.
Type:
"string"
Default:
""
Example:
"cn=admin,dc=example,dc=com"
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.bind.passwordThe path to a file containing the credentials to use when binding to the LDAP server (if not binding anonymously).
Type:
"string"
Default:
"/etc/ldap/bind.password"
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.bind.policySpecifies the policy to use for reconnecting to an unavailable
LDAP server. The default is hard_open, which
reconnects if opening the connection to the directory server
failed. By contrast, hard_init reconnects if
initializing the connection failed. Initializing may not
actually contact the directory server, and it is possible that
a malformed configuration file will trigger reconnection. If
soft is specified, then
nss_ldap will return immediately on server
failure. All hard reconnect policies block with exponential
backoff before retrying.
Type:
"string"
Default:
"hard_open"
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.bind.timeLimitSpecifies the time limit (in seconds) to use when connecting
to the directory server. This is distinct from the time limit
specified in users.ldap.timeLimit and affects
the initial server connection only.
Type:
"integer"
Default:
30
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.daemon.enableWhether to let the nslcd daemon (nss-pam-ldapd) handle the LDAP lookups for NSS and PAM. This can improve performance, and if you need to bind to the LDAP server with a password, it increases security, since only the nslcd user needs to have access to the bindpw file, not everyone that uses NSS and/or PAM. If this option is enabled, a local nscd user is created automatically, and the nslcd service is started automatically when the network get up.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.daemon.extraConfigExtra configuration options that will be added verbatim at the end of the nslcd configuration file (nslcd.conf).
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.enableWhether to enable authentication against an LDAP server.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.extraConfigExtra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf).
If users.ldap.daemon is enabled, this
configuration will not be used. In that case, use
users.ldap.daemon.extraConfig instead.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.serverThe URL of the LDAP server.
Type:
"unspecified"
Example:
"ldap://ldap.example.org/"
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.timeLimitSpecifies the time limit (in seconds) to use when performing searches. A value of zero (0), which is the default, is to wait indefinitely for searches to be completed.
Type:
"integer"
Default:
0
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.ldap.useTLSIf enabled, use TLS (encryption) over an LDAP (port 389)
connection. The alternative is to specify an LDAPS server (port
636) in users.ldap.server or to forego
security.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/ldap.nix>
|
users.motdMessage of the day shown to users when they log in.
Type:
"null or string"
Default:
null
Example:
"Today is Sweetmorn, the 4th day of The Aftermath in the YOLD 3178."
Declared by:
<nixpkgs/nixos/modules/security/pam.nix>
|
users.mutableUsersIf set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands. On system activation, the
existing contents of the /etc/passwd and
/etc/group files will be merged with the
contents generated from the users.extraUsers and
users.extraGroups options.
The initial password for a user will be set
according to users.extraUsers, but existing passwords
will not be changed.
If set to false, the contents of the user and
group files will simply be replaced on system activation. This also
holds for the user passwords; all changed
passwords will be reset according to the
users.extraUsers configuration on activation.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/config/users-groups.nix>
|
virtualisation.docker.enableThis option enables docker, a daemon that manages linux containers. Users in the "docker" group can interact with the daemon (e.g. to start or stop containers) using the docker command line tool.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/docker.nix>
|
virtualisation.docker.extraOptionsThe extra command-line options to pass to docker daemon.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/virtualisation/docker.nix>
|
virtualisation.docker.socketActivationThis option enables docker with socket activation. I.e. docker will start when first called by client. Note: This is false by default because systemd lower than 214 that nixos uses so far, doesn't support SocketGroup option, so socket created by docker has root group now. This will likely be changed in future. So set this option explicitly to false if you wish.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/docker.nix>
|
virtualisation.libvirtd.enableThis option enables libvirtd, a daemon that manages virtual machines. Users in the "libvirtd" group can interact with the daemon (e.g. to start or stop VMs) using the virsh command line tool, among others.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/libvirtd.nix>
|
virtualisation.libvirtd.enableKVMThis option enables support for QEMU/KVM in libvirtd.
Type:
"boolean"
Default:
true
Declared by:
<nixpkgs/nixos/modules/virtualisation/libvirtd.nix>
|
virtualisation.libvirtd.extraConfigExtra contents appended to the libvirtd configuration file, libvirtd.conf.
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/virtualisation/libvirtd.nix>
|
virtualisation.libvirtd.onShutdownWhen shutting down / restarting the host what method should be used to gracefully halt the guests. Setting to "shutdown" will cause an ACPI shutdown of each guest. "suspend" will attempt to save the state of the guests ready to restore on boot.
Type:
"one of shutdown, suspend"
Default:
"suspend"
Declared by:
<nixpkgs/nixos/modules/virtualisation/libvirtd.nix>
|
virtualisation.lxc.defaultConfigDefault config (default.conf) for new containers, i.e. for network config. See lxc.container.conf (5).
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/virtualisation/lxc.nix>
|
virtualisation.lxc.enableThis enables Linux Containers (LXC), which provides tools for creating and managing system or application containers on Linux.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/lxc.nix>
|
virtualisation.lxc.systemConfigThis is the system-wide LXC config. See lxc.system.conf(5).
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/virtualisation/lxc.nix>
|
virtualisation.lxc.usernetConfigThis is the config file for managing unprivileged user network administration access in LXC. See lxc-user-net(5).
Type:
"string"
Default:
""
Declared by:
<nixpkgs/nixos/modules/virtualisation/lxc.nix>
|
virtualisation.vswitch.enableEnable Open vSwitch. A configuration daemon (ovs-server) will be started.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/openvswitch.nix>
|
virtualisation.xen.bootParamsParameters passed to the Xen hypervisor at boot time.
Type:
"unspecified"
Default:
""
Declared by:
<nixpkgs/nixos/modules/virtualisation/xen-dom0.nix>
|
virtualisation.xen.bridgeCreate a bridge for the Xen domUs to connect to.
Type:
"unspecified"
Default:
"xenbr0"
Declared by:
<nixpkgs/nixos/modules/virtualisation/xen-dom0.nix>
|
virtualisation.xen.domain0MemorySizeAmount of memory (in MiB) allocated to Domain 0 on boot. If set to 0, all memory is assigned to Domain 0.
Type:
"unspecified"
Default:
0
Example:
512
Declared by:
<nixpkgs/nixos/modules/virtualisation/xen-dom0.nix>
|
virtualisation.xen.enableSetting this option enables the Xen hypervisor, a virtualisation technology that allows multiple virtual machines, known as domains, to run concurrently on the physical machine. NixOS runs as the privileged Domain 0. This option requires a reboot to take effect.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/xen-dom0.nix>
|
virtualisation.xen.storedXen Store daemon to use. Defaults to oxenstored of the xen package.
Type:
"path"
Declared by:
<nixpkgs/nixos/modules/virtualisation/xen-dom0.nix>
|
virtualisation.xen.traceEnable Xen tracing.
Type:
"unspecified"
Default:
false
Declared by:
<nixpkgs/nixos/modules/virtualisation/xen-dom0.nix>
|
zramSwap.enableEnable in-memory compressed swap space provided by the zram kernel module. It is recommended to enable only for kernel 3.14 or higher.
Type:
"boolean"
Default:
false
Declared by:
<nixpkgs/nixos/modules/config/zram.nix>
|
zramSwap.memoryPercentMaximum amount of memory that can be used by the zram swap devices (as a percentage of your total memory). Defaults to 1/2 of your total RAM.
Type:
"integer"
Default:
50
Declared by:
<nixpkgs/nixos/modules/config/zram.nix>
|
zramSwap.numDevicesNumber of zram swap devices to create. It should be equal to the number of CPU cores your system has.
Type:
"integer"
Default:
4
Declared by:
<nixpkgs/nixos/modules/config/zram.nix>
|
zramSwap.priorityPriority of the zram swap devices. It should be a number higher than the priority of your disk-based swap devices (so that the system will fill the zram swap devices before falling back to disk swap).
Type:
"integer"
Default:
5
Declared by:
<nixpkgs/nixos/modules/config/zram.nix>
|